DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Haley: SCDOR hacking may not have been preventable

Posted on November 14, 2012 by Dissent

Color me stunned.

In one breath, Governor Haley says that even with what is known now, there is “no way to say it could have been prevented.” Then we learn that investigators “believe that a hacker tricked someone at the Department of Revenue into opening a file that gave the hacker access to the system.”

And the Governor believes there’s no way to say the breach could have been prevented? Seriously? I can picture Jon Stewart describing this.

Read more on WYFF.


Related:

  • IVF provider Genea notifies patients about the cyberattack earlier this year.
  • Clorox Files $380M Suit Alleging Cognizant Gave Hackers Passwords in Catastrophic 2023 Cyberattack
  • France Travail: At least 340,000 job seekers victims of new hack
  • #StopRansomware: Interlock
  • Two more entities have folded after ransomware attacks
  • British institutions to be banned from paying ransoms to Russian hackers
Category: Breach IncidentsGovernment SectorMalwareU.S.

Post navigation

← Large-Scale Health Data Breaches Declined in 2012 – So Far, Anyway
LG Site Developers, BravoPhone make “Legal” threats to ozdc.net →

1 thought on “Haley: SCDOR hacking may not have been preventable”

  1. IA Eng says:
    November 16, 2012 at 12:33 pm

    One thing that IT Training has taught me is that if a senior member is going to speak, that they should be informed by someone who kows technically about the system. The person who briefed the govenor was just as clueless as the govenor himself. Both appear to be only mildly familiar with the threats that occur almost daily. I wonder if there is ANY mandatory IT training that has to occur for state officials like Phishing, virus, social engineering or the like.

    Commmon, could not have been prevented? Social Engineering CAN be prevented. Setting security archetecture CAN prevent some files from passing through. Designing a network archetecture that has computer assets in a ring of trust CAN happen. Call it laziness, incompetence, inadequate training, poor security, lack of ethics or whatever it truly is. One thing for certain – it could very well happen again should the cause of the issue go uncorrected.

    Typically if there is an issue like this, sometimes – not always – there are other galring issues that exist as well. I don’t know what it is about big business – they lack the “guts” to bring in a third party to get an assessment of their network security. The cost of the assessment is FAR LOWER than a cost of a breach, and it shows due diligence.

    If it was me sitting there having a relaible source tell me to brief that it looks like the breach could not have been prevented, I would be SERIOUSLY worried about the infrastucture around the individuals that say this. To me it it sounds like either they lack the security knowledge, they want to cover something up, they don’t care about security and refuse to dump any cash into something to protect the network.

    Whatever the true outcome is, an understanding of security from the Top-down approach needs to be in place.

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure
  • Hacker group “Silent Crow” claims responsibility for cyberattack on Russia’s Aeroflot
  • AIIMS ORBO Portal Vulnerability Exposing Sensitive Organ Donor Data Discovered by Researcher
  • Two Data Breaches in Three Years: McKenzie Health
  • Scattered Spider is running a VMware ESXi hacking spree
  • BreachForums — the one that went offline in April — reappears with a new founder/owner
  • Fans React After NASCAR Confirms Ransomware Breach
  • Allianz Life says ‘majority’ of customers’ personal data stolen in cyberattack (1)
  • Infinite Services notifying employees and patients of limited ransomware attack
  • The safe place for women to talk wasn’t so safe: hackers leak 13,000 user photos and IDs from the Tea app

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Congress tries to outlaw AI that jacks up prices based on what it knows about you
  • Microsoft’s controversial Recall feature is now blocked by Brave and AdGuard
  • Trump Administration Issues AI Action Plan and Series of AI Executive Orders
  • Indonesia asked to reassess data privacy terms in new U.S. trade deal
  • Meta Denies Tracking Menstrual Data in Flo Health Privacy Trial
  • Wikipedia seeks to shield contributors from UK law targeting online anonymity
  • British government reportedlu set to back down on secret iCloud backdoor after US pressure

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.