SlideShare uma empresa Scribd logo
1 de 13
MWEB Business: Hacked
    Management Information Systems


                       10.12.2012
Outline

1. What technology issues led to the security breach at MWEB?

2. What is the possible business impact of this security breach
   for both MWEB and its customers?

3. If you were an MWEB customer, would you consider MWEB's
   response to the security breach to be acceptable?

4. What should MWEB do in the future to avoid similar incidents?
o South Africa’s 2nd largest Internet Service Provider

o Founded in 1997

o Divisions: MWEB Connect and MWEB Business

o Customer base:
   •   Home users
   •   Small, medium and large enterprises
   •   Corporate clients
Portfolio

o Tailored Business Solutions

o Personalized account management

o Own world class network infrastructure

o International connectivity redundancy

o Next generation data centers

o 24/7 Technical support
Security Measures

o Using AVG Internet Security as partner
o Identity protection
o LinkScanner (safe surfing)
o WebShield (safe social networking)
o Antiphishing, Antispam, Antivirus,
  Antispyware
o Enhanced firewall
o Automatic e-mail cleaning
o Blocking network ports commonly used by
  hackers
Dangerous Breach

Issue:
oCompromised subscribers account details
oPublished logon and password details



Reason
oHackers gained access to Web based Internet
Solutions’ self-service management system
o outsourced, not in total control
Data Management
Business Impact

o Notifying customers and find solution
o Determine reason for breach = interruption of business processes
o Work together with IS
o Lost trust of customers  gain back
o Implement proper policies and controls
o Prepare for legal, financial risks
o Threat to customer retention and reputation



          Very tricky process with

          intangible and tangible costs
Customer Impact

o Need for explanation
o Need for behavioral recommendations
o Loss of personal information (privacy)
o Data lost or inaccurate
o Additional compromising of related accounts
o Inconvenience: have to change password or
  could not access the service
o Lost trust in the company
Response to the security breach
o 25.10.2010 Security Breach
       “Dear sirs if you see your own name on the list maybe it's time for
        switching ISP (in case you have any option) :D”
o Disclosed and responded the same day (quickly!!)


o User names  recreated
  Passwords  changed


o No personal information was lost
o Clients did not suffer any losses
Response to the security breach

o Internet Solutions network  own IPC network
o Repels 5000 attacks a day!
o Added security measure  reset the passwords
o Investigation together with Internet Solutions



             Acceptable response?           Yes


                      Saved trust?           No
To-do list for the future


o Digital certificates
o Intrusion detection system
o MIS audit
o Regular and thorough testing
o Improved identity management
Thank you!

Mais conteúdo relacionado

Mais procurados

Network security for E-Commerce
Network security for E-CommerceNetwork security for E-Commerce
Network security for E-CommerceHem Pokhrel
 
1 introduction to e commerce
1 introduction to e commerce1 introduction to e commerce
1 introduction to e commercesajid ullah
 
Information systems in business
Information systems in businessInformation systems in business
Information systems in businessjuliansdvsf10
 
An introduction to E-Commerce
An introduction to E-CommerceAn introduction to E-Commerce
An introduction to E-CommerceAnubha .
 
Amazing Benefits of Hiring a Managed Service Provider
Amazing Benefits of Hiring a Managed Service ProviderAmazing Benefits of Hiring a Managed Service Provider
Amazing Benefits of Hiring a Managed Service ProviderDebojyoti Ghosh
 
MIS-CH05: IT Infrastructure and Emerging Technologies
MIS-CH05: IT Infrastructure and Emerging TechnologiesMIS-CH05: IT Infrastructure and Emerging Technologies
MIS-CH05: IT Infrastructure and Emerging TechnologiesSukanya Ben
 
Chap08 Enterprise Business Systems
Chap08 Enterprise Business SystemsChap08 Enterprise Business Systems
Chap08 Enterprise Business SystemsAqib Syed
 
Management and organization (jamuna group) PPT
Management and organization (jamuna group) PPTManagement and organization (jamuna group) PPT
Management and organization (jamuna group) PPTelena sopnita
 
Maven BPO - Company Profile
Maven BPO - Company ProfileMaven BPO - Company Profile
Maven BPO - Company ProfileTom Sidler
 
IBM Presentation
IBM PresentationIBM Presentation
IBM Presentationrolsen3
 
Internship report on recruitment & selection process of bangladesh krishi bank.
Internship report on recruitment & selection process of bangladesh krishi bank.Internship report on recruitment & selection process of bangladesh krishi bank.
Internship report on recruitment & selection process of bangladesh krishi bank.Rizwan Khan
 
The role of information technology in the business sector
The role of information technology in the business sectorThe role of information technology in the business sector
The role of information technology in the business sectorSyed Uzair Ali
 
MIS-CH08: Securing Information Systems
MIS-CH08: Securing Information SystemsMIS-CH08: Securing Information Systems
MIS-CH08: Securing Information SystemsSukanya Ben
 
Accenture BPO brochure
Accenture BPO brochureAccenture BPO brochure
Accenture BPO brochureLawrence K
 
Internship presentation
Internship presentationInternship presentation
Internship presentationSusmita Sen
 
Business impact assessment (bia)
Business impact assessment (bia)Business impact assessment (bia)
Business impact assessment (bia)Shashwat Shankar
 
CUSTOMER SERVICE: Working in a Business Environment
CUSTOMER SERVICE: Working in a Business EnvironmentCUSTOMER SERVICE: Working in a Business Environment
CUSTOMER SERVICE: Working in a Business EnvironmentThe Pathway Group
 
Nbp recruitment and selection by ibrahim painda kheeL
Nbp recruitment and selection by ibrahim painda kheeLNbp recruitment and selection by ibrahim painda kheeL
Nbp recruitment and selection by ibrahim painda kheeLibrahim Painda Kheel
 

Mais procurados (20)

Network security for E-Commerce
Network security for E-CommerceNetwork security for E-Commerce
Network security for E-Commerce
 
1 introduction to e commerce
1 introduction to e commerce1 introduction to e commerce
1 introduction to e commerce
 
Information systems in business
Information systems in businessInformation systems in business
Information systems in business
 
An introduction to E-Commerce
An introduction to E-CommerceAn introduction to E-Commerce
An introduction to E-Commerce
 
Amazing Benefits of Hiring a Managed Service Provider
Amazing Benefits of Hiring a Managed Service ProviderAmazing Benefits of Hiring a Managed Service Provider
Amazing Benefits of Hiring a Managed Service Provider
 
MIS-CH05: IT Infrastructure and Emerging Technologies
MIS-CH05: IT Infrastructure and Emerging TechnologiesMIS-CH05: IT Infrastructure and Emerging Technologies
MIS-CH05: IT Infrastructure and Emerging Technologies
 
Chap08 Enterprise Business Systems
Chap08 Enterprise Business SystemsChap08 Enterprise Business Systems
Chap08 Enterprise Business Systems
 
Management and organization (jamuna group) PPT
Management and organization (jamuna group) PPTManagement and organization (jamuna group) PPT
Management and organization (jamuna group) PPT
 
Social and Ethical Issues in Information System
Social and Ethical Issues in Information SystemSocial and Ethical Issues in Information System
Social and Ethical Issues in Information System
 
Maven BPO - Company Profile
Maven BPO - Company ProfileMaven BPO - Company Profile
Maven BPO - Company Profile
 
Dutch Bangla Bank MIS
Dutch Bangla Bank MISDutch Bangla Bank MIS
Dutch Bangla Bank MIS
 
IBM Presentation
IBM PresentationIBM Presentation
IBM Presentation
 
Internship report on recruitment & selection process of bangladesh krishi bank.
Internship report on recruitment & selection process of bangladesh krishi bank.Internship report on recruitment & selection process of bangladesh krishi bank.
Internship report on recruitment & selection process of bangladesh krishi bank.
 
The role of information technology in the business sector
The role of information technology in the business sectorThe role of information technology in the business sector
The role of information technology in the business sector
 
MIS-CH08: Securing Information Systems
MIS-CH08: Securing Information SystemsMIS-CH08: Securing Information Systems
MIS-CH08: Securing Information Systems
 
Accenture BPO brochure
Accenture BPO brochureAccenture BPO brochure
Accenture BPO brochure
 
Internship presentation
Internship presentationInternship presentation
Internship presentation
 
Business impact assessment (bia)
Business impact assessment (bia)Business impact assessment (bia)
Business impact assessment (bia)
 
CUSTOMER SERVICE: Working in a Business Environment
CUSTOMER SERVICE: Working in a Business EnvironmentCUSTOMER SERVICE: Working in a Business Environment
CUSTOMER SERVICE: Working in a Business Environment
 
Nbp recruitment and selection by ibrahim painda kheeL
Nbp recruitment and selection by ibrahim painda kheeLNbp recruitment and selection by ibrahim painda kheeL
Nbp recruitment and selection by ibrahim painda kheeL
 

Destaque

MWEB - Trends Report 2014
MWEB - Trends Report 2014 MWEB - Trends Report 2014
MWEB - Trends Report 2014 MWEB_SA
 
Soundbuzz’s Music Strategy for Asia-Pacific
Soundbuzz’s Music Strategy for Asia-Pacific Soundbuzz’s Music Strategy for Asia-Pacific
Soundbuzz’s Music Strategy for Asia-Pacific Birte Gröger
 
Chapter 8 management information system 12th edition 2012 laudon
Chapter 8 management information system 12th edition 2012 laudonChapter 8 management information system 12th edition 2012 laudon
Chapter 8 management information system 12th edition 2012 laudonYanick Iglesias
 
WoW Project - World of Wifi
WoW Project - World of WifiWoW Project - World of Wifi
WoW Project - World of Wifitelpin telpin
 
KeyWifi business presentation
KeyWifi business presentationKeyWifi business presentation
KeyWifi business presentationtmcmh
 
New Ways to Generate Revenues from Public Wi-Fi
New Ways to Generate Revenues from Public Wi-FiNew Ways to Generate Revenues from Public Wi-Fi
New Ways to Generate Revenues from Public Wi-FiWi-Fi 360
 
WiFi HotSpot Marketin
WiFi HotSpot MarketinWiFi HotSpot Marketin
WiFi HotSpot MarketinKody Smith
 
WiFi: Current And Future Opportunities
WiFi: Current And Future Opportunities WiFi: Current And Future Opportunities
WiFi: Current And Future Opportunities Peter Jarich
 
Go to Market Strategy
Go to Market StrategyGo to Market Strategy
Go to Market StrategyRajiv Netra
 
Go-to-Market Best Practices for Startups
Go-to-Market Best Practices for StartupsGo-to-Market Best Practices for Startups
Go-to-Market Best Practices for Startupsa16z
 
Go-To-Market Strategy - Entrepreneurship 101 (2012/2013)
Go-To-Market Strategy - Entrepreneurship 101 (2012/2013)Go-To-Market Strategy - Entrepreneurship 101 (2012/2013)
Go-To-Market Strategy - Entrepreneurship 101 (2012/2013)MaRS Discovery District
 
Go to market planning
Go to market planningGo to market planning
Go to market planningMike McCormac
 
Go to-market strategy for B2B SaaS companies
Go to-market strategy for B2B SaaS companiesGo to-market strategy for B2B SaaS companies
Go to-market strategy for B2B SaaS companiesGuillaume Lerouge
 

Destaque (18)

MWEB - Trends Report 2014
MWEB - Trends Report 2014 MWEB - Trends Report 2014
MWEB - Trends Report 2014
 
Soundbuzz’s Music Strategy for Asia-Pacific
Soundbuzz’s Music Strategy for Asia-Pacific Soundbuzz’s Music Strategy for Asia-Pacific
Soundbuzz’s Music Strategy for Asia-Pacific
 
Apache
ApacheApache
Apache
 
Chapter 8 management information system 12th edition 2012 laudon
Chapter 8 management information system 12th edition 2012 laudonChapter 8 management information system 12th edition 2012 laudon
Chapter 8 management information system 12th edition 2012 laudon
 
WoW Project - World of Wifi
WoW Project - World of WifiWoW Project - World of Wifi
WoW Project - World of Wifi
 
KeyWifi business presentation
KeyWifi business presentationKeyWifi business presentation
KeyWifi business presentation
 
Apa Itu WiFi
Apa Itu WiFiApa Itu WiFi
Apa Itu WiFi
 
New Ways to Generate Revenues from Public Wi-Fi
New Ways to Generate Revenues from Public Wi-FiNew Ways to Generate Revenues from Public Wi-Fi
New Ways to Generate Revenues from Public Wi-Fi
 
WiFi HotSpot Marketin
WiFi HotSpot MarketinWiFi HotSpot Marketin
WiFi HotSpot Marketin
 
Monetizing WiFi
Monetizing WiFiMonetizing WiFi
Monetizing WiFi
 
WiFi: Current And Future Opportunities
WiFi: Current And Future Opportunities WiFi: Current And Future Opportunities
WiFi: Current And Future Opportunities
 
Go to Market Strategy
Go to Market StrategyGo to Market Strategy
Go to Market Strategy
 
Go-to-Market Strategy vs Marketing Strategy
Go-to-Market Strategy vs Marketing StrategyGo-to-Market Strategy vs Marketing Strategy
Go-to-Market Strategy vs Marketing Strategy
 
Web 2.0 youtube
Web 2.0 youtubeWeb 2.0 youtube
Web 2.0 youtube
 
Go-to-Market Best Practices for Startups
Go-to-Market Best Practices for StartupsGo-to-Market Best Practices for Startups
Go-to-Market Best Practices for Startups
 
Go-To-Market Strategy - Entrepreneurship 101 (2012/2013)
Go-To-Market Strategy - Entrepreneurship 101 (2012/2013)Go-To-Market Strategy - Entrepreneurship 101 (2012/2013)
Go-To-Market Strategy - Entrepreneurship 101 (2012/2013)
 
Go to market planning
Go to market planningGo to market planning
Go to market planning
 
Go to-market strategy for B2B SaaS companies
Go to-market strategy for B2B SaaS companiesGo to-market strategy for B2B SaaS companies
Go to-market strategy for B2B SaaS companies
 

Semelhante a MWEB Business Security Breach: Lessons Learned

IT Security: What an In-Plant Print Center Needs to Know
IT Security: What an In-Plant Print Center Needs to KnowIT Security: What an In-Plant Print Center Needs to Know
IT Security: What an In-Plant Print Center Needs to KnowRochester Software Associates
 
Security in the News
Security in the NewsSecurity in the News
Security in the NewsJames Sutter
 
Crush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access ManagementCrush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access ManagementBeyondTrust
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and ComplianceBankingdotcom
 
Network Security
Network SecurityNetwork Security
Network Securitypethurusan
 
Protecting Your Business - All Covered Security Services
Protecting Your Business - All Covered Security ServicesProtecting Your Business - All Covered Security Services
Protecting Your Business - All Covered Security ServicesAll Covered
 
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob DavisLuncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob DavisNorth Texas Chapter of the ISSA
 
Cyber Security and the Impact on your Business
Cyber Security and the Impact on your BusinessCyber Security and the Impact on your Business
Cyber Security and the Impact on your BusinessLucy Denver
 
Iron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyIron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyGabor Szathmari
 
Community IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators
 
Security 101 for No- techies
Security 101 for No- techiesSecurity 101 for No- techies
Security 101 for No- techiesBrenton Johnson
 
Oath appsec sf 2015 dem rev. 2
Oath appsec sf 2015 dem rev. 2Oath appsec sf 2015 dem rev. 2
Oath appsec sf 2015 dem rev. 2Donald Malloy
 
Strong Authentication - Open Source
Strong Authentication - Open SourceStrong Authentication - Open Source
Strong Authentication - Open SourceDonald Malloy
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3Meg Weber
 
AMER Introduction to ThousandEyes Webinar
AMER Introduction to ThousandEyes WebinarAMER Introduction to ThousandEyes Webinar
AMER Introduction to ThousandEyes WebinarThousandEyes
 
Office 365 in today's digital threats landscape: attacks & remedies from a ha...
Office 365 in today's digital threats landscape: attacks & remedies from a ha...Office 365 in today's digital threats landscape: attacks & remedies from a ha...
Office 365 in today's digital threats landscape: attacks & remedies from a ha...panagenda
 

Semelhante a MWEB Business Security Breach: Lessons Learned (20)

IT Security: What an In-Plant Print Center Needs to Know
IT Security: What an In-Plant Print Center Needs to KnowIT Security: What an In-Plant Print Center Needs to Know
IT Security: What an In-Plant Print Center Needs to Know
 
Security in the News
Security in the NewsSecurity in the News
Security in the News
 
Crush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access ManagementCrush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access Management
 
CyberSecurity Update Slides
CyberSecurity Update SlidesCyberSecurity Update Slides
CyberSecurity Update Slides
 
Cybersecurity update 12
Cybersecurity update 12Cybersecurity update 12
Cybersecurity update 12
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
 
Network Security
Network SecurityNetwork Security
Network Security
 
Protecting Your Business - All Covered Security Services
Protecting Your Business - All Covered Security ServicesProtecting Your Business - All Covered Security Services
Protecting Your Business - All Covered Security Services
 
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob DavisLuncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
 
Cyber Security and the Impact on your Business
Cyber Security and the Impact on your BusinessCyber Security and the Impact on your Business
Cyber Security and the Impact on your Business
 
Iron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyIron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data Responsibly
 
Community IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best Practices
 
Data Breach Detection: Are you ready for GDPR?
Data Breach Detection: Are you ready for GDPR?Data Breach Detection: Are you ready for GDPR?
Data Breach Detection: Are you ready for GDPR?
 
Security 101 for No- techies
Security 101 for No- techiesSecurity 101 for No- techies
Security 101 for No- techies
 
Oath appsec sf 2015 dem rev. 2
Oath appsec sf 2015 dem rev. 2Oath appsec sf 2015 dem rev. 2
Oath appsec sf 2015 dem rev. 2
 
Strong Authentication - Open Source
Strong Authentication - Open SourceStrong Authentication - Open Source
Strong Authentication - Open Source
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
 
New Horizons SCYBER Presentation
New Horizons SCYBER PresentationNew Horizons SCYBER Presentation
New Horizons SCYBER Presentation
 
AMER Introduction to ThousandEyes Webinar
AMER Introduction to ThousandEyes WebinarAMER Introduction to ThousandEyes Webinar
AMER Introduction to ThousandEyes Webinar
 
Office 365 in today's digital threats landscape: attacks & remedies from a ha...
Office 365 in today's digital threats landscape: attacks & remedies from a ha...Office 365 in today's digital threats landscape: attacks & remedies from a ha...
Office 365 in today's digital threats landscape: attacks & remedies from a ha...
 

Mais de Birte Gröger

Knowing the Drill: Virtual Teamwork at BP
Knowing the Drill: Virtual Teamwork at BPKnowing the Drill: Virtual Teamwork at BP
Knowing the Drill: Virtual Teamwork at BPBirte Gröger
 
Nordea goes green with IT
Nordea goes green with ITNordea goes green with IT
Nordea goes green with ITBirte Gröger
 
New Service Design Excercise - Experience Hub
New Service Design Excercise - Experience HubNew Service Design Excercise - Experience Hub
New Service Design Excercise - Experience HubBirte Gröger
 
Progressive: Pay-as-you-go insurance
Progressive: Pay-as-you-go insuranceProgressive: Pay-as-you-go insurance
Progressive: Pay-as-you-go insuranceBirte Gröger
 
How do fear appeals in advertising work?
How do fear appeals in advertising work?How do fear appeals in advertising work?
How do fear appeals in advertising work?Birte Gröger
 
Teaching Bayesian Method
Teaching Bayesian MethodTeaching Bayesian Method
Teaching Bayesian MethodBirte Gröger
 

Mais de Birte Gröger (6)

Knowing the Drill: Virtual Teamwork at BP
Knowing the Drill: Virtual Teamwork at BPKnowing the Drill: Virtual Teamwork at BP
Knowing the Drill: Virtual Teamwork at BP
 
Nordea goes green with IT
Nordea goes green with ITNordea goes green with IT
Nordea goes green with IT
 
New Service Design Excercise - Experience Hub
New Service Design Excercise - Experience HubNew Service Design Excercise - Experience Hub
New Service Design Excercise - Experience Hub
 
Progressive: Pay-as-you-go insurance
Progressive: Pay-as-you-go insuranceProgressive: Pay-as-you-go insurance
Progressive: Pay-as-you-go insurance
 
How do fear appeals in advertising work?
How do fear appeals in advertising work?How do fear appeals in advertising work?
How do fear appeals in advertising work?
 
Teaching Bayesian Method
Teaching Bayesian MethodTeaching Bayesian Method
Teaching Bayesian Method
 

Último

Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Roland Driesen
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Tina Ji
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfOnline Income Engine
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insightsseri bangash
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in managementchhavia330
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 

Último (20)

Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdf
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insights
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in management
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 

MWEB Business Security Breach: Lessons Learned

  • 1. MWEB Business: Hacked Management Information Systems 10.12.2012
  • 2. Outline 1. What technology issues led to the security breach at MWEB? 2. What is the possible business impact of this security breach for both MWEB and its customers? 3. If you were an MWEB customer, would you consider MWEB's response to the security breach to be acceptable? 4. What should MWEB do in the future to avoid similar incidents?
  • 3. o South Africa’s 2nd largest Internet Service Provider o Founded in 1997 o Divisions: MWEB Connect and MWEB Business o Customer base: • Home users • Small, medium and large enterprises • Corporate clients
  • 4. Portfolio o Tailored Business Solutions o Personalized account management o Own world class network infrastructure o International connectivity redundancy o Next generation data centers o 24/7 Technical support
  • 5. Security Measures o Using AVG Internet Security as partner o Identity protection o LinkScanner (safe surfing) o WebShield (safe social networking) o Antiphishing, Antispam, Antivirus, Antispyware o Enhanced firewall o Automatic e-mail cleaning o Blocking network ports commonly used by hackers
  • 6. Dangerous Breach Issue: oCompromised subscribers account details oPublished logon and password details Reason oHackers gained access to Web based Internet Solutions’ self-service management system o outsourced, not in total control
  • 8. Business Impact o Notifying customers and find solution o Determine reason for breach = interruption of business processes o Work together with IS o Lost trust of customers  gain back o Implement proper policies and controls o Prepare for legal, financial risks o Threat to customer retention and reputation Very tricky process with intangible and tangible costs
  • 9. Customer Impact o Need for explanation o Need for behavioral recommendations o Loss of personal information (privacy) o Data lost or inaccurate o Additional compromising of related accounts o Inconvenience: have to change password or could not access the service o Lost trust in the company
  • 10. Response to the security breach o 25.10.2010 Security Breach “Dear sirs if you see your own name on the list maybe it's time for switching ISP (in case you have any option) :D” o Disclosed and responded the same day (quickly!!) o User names  recreated Passwords  changed o No personal information was lost o Clients did not suffer any losses
  • 11. Response to the security breach o Internet Solutions network  own IPC network o Repels 5000 attacks a day! o Added security measure  reset the passwords o Investigation together with Internet Solutions Acceptable response? Yes Saved trust? No
  • 12. To-do list for the future o Digital certificates o Intrusion detection system o MIS audit o Regular and thorough testing o Improved identity management

Notas do Editor

  1. Cater for specific connectivity requirements
  2. (Wired and wireless Internet connectivity, hosting services, applications, VoIP)
  3. Automatic e-mail cleaning from recognized malware sources  protection against junkmail and viruses
  4. 2390 users of digital subscriber line were affected MWEB uses this system to manage accounts not yet migrated to MWEB network Legacy system, not so security options
  5. Bulk was already migrated but some business users still on the old system
  6. Quotation is from the site where the information was published
  7. Thank you for listening. Any questions?