HACKED

A few facts and figures

  • Medfield, Massachusetts, USA: ransom paid after municipal data networks shut down for a week
  • Salt Lake County, USA: exposure of personal data of 14,200 current and former  employees
  • eThekwini Municipality Johannesburg: e-services shut down following exposure of personal data after a hacker tampered with the website URL
  • Ottawa, Canada: accidental release of personal information of nearly 2000 pensioners during an interview
  • Almelo Netherlands: 20 gigabytes of data, including personal info leaked from municipal servers
  • Utrecht Netherlands: leakage of  personal details via municipal intranet, effecting thousands of residents

WHAT YOU NEED TO KNOW

THREATS
Unauthorized access to protected and unprotected data
Innocent provision of information, extortion or forced handover of sensitive information
Data leakage via endpoints
Viruses, Trojan horses or worms via endpoints
Trafficking and external use of stolen sensitive data
RESULTS
People: personal data, contact info, data about family, financial information, payments, assessments
Facility: internal and external information, nearly all digital data like population registries, government, banking, medical, educational, national and international law enforcement databases

This may happen

Threat to the safety of a city and its residents
Malicious control of municipal data networks
Possession and use of residents and employees personal details and information
Irreparable damage to a municipality’s integrity and image
Trafficking and reusing stolen/modified information
Countless waste of time and money spent handling successful attacks
Failing to comply with regulations and standards like like like EU GDPR, or HIPAA
TO PROTECT YOUR DATA
CONTACT US

Data Protection Suite Modules

product
INSPECTOR
Inspector checks both file content and metadata without preventing the natural flow of business.
READ MORE
product
REPORTER
Reporter automatically pulls strategic and periodic information into reports and distributes them to defined recipients.
READ MORE
product
ENCRYPTOR
Encryptor, a smooth-running and transparent data encryption tool, fully protects your company’s private information.
READ MORE
product
DISCOVERER
Discoverer provides the knowledge and insight for security personnel to introduce current and strong data security policies to protect sensitive company information.
READ MORE
product
PROTECTOR
Protector has the flexibility and strength to control your port and device endpoints and to shield your company against external hazards.
READ MORE
product
AUDITOR
Auditor pinpoints all usage of USB, FireWire, PCMCIA, PCI, internal storage and WiFi connections in exportable reports.
READ MORE
Click Here to Download Whitepapers in PDF Format.
Font Resize