Third-Party Vulnerabilities Often Lead to Big Problems

There are reports circulating that Target's point-of-sale files may have been compromised as a result of a phishing email breach that took place at a third-party heating and air-conditioning vendor's site. An employee of the maintenance firm may have opened the malware-infested file, which then infected Target's systems. Whether or not this turns out to be the case, it points to a vulnerability seen in many IT systems – lax security procedures among third-party partners … another lesson in the Achille's Heel of many corporate networks.

To stay on top of all the trends, subscribe to Database Trends and Applications magazine

Related Articles

In many ways, IT protection is like a game of poker. There are two things you need to win: a strong ability to play and the best hand you can get. With the former, a lot of it comes down to knowing what not to do.

Posted February 20, 2014