Does anyone remember when T-Mobile was hacked? To name just a few companies.
Hackers had compromised the T-Mobile network and gained full access to Social Security numbers, billing information, personal information, and credit card information of T-Mobile customers.
The customers included celebrities, executives, and Secret Service agents. Meanwhile, the Secret Service customers were using T-Mobile cell phones to access their e-mail. The hackers had free access for eight months before the breach was detected. The quantity and nature of the information the hackers stole will likely never be determined with accuracy, and it is likely that confidential information like classified documents was obtained.
What makes this story particularly alarming is that if everyone doesn't own a cell phone, they likely know how to use one. The scope of the breach was staggering.
Today criminals are becoming more and more sophisticated. They are meticulous planners. They tie up loose ends. Their goal is not to simply break things. And with enough time, resources, money, and planning any network can be hacked.
And so the question is: how do you protect your network? The answer to this question depends on what and how many security measures do you need, and how much risk are you willing to accept.
At Security Arsenal, we have staff that can help you answer these questions, as well as providing solutions and products to give you peace of mind in securing your network. If today's headline of a security breach keeps you up at night, it is time to contact us: email@example.com