DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Haley: SCDOR hacking may not have been preventable

Posted on November 14, 2012 by Dissent

Color me stunned.

In one breath, Governor Haley says that even with what is known now, there is “no way to say it could have been prevented.” Then we learn that investigators “believe that a hacker tricked someone at the Department of Revenue into opening a file that gave the hacker access to the system.”

And the Governor believes there’s no way to say the breach could have been prevented? Seriously? I can picture Jon Stewart describing this.

Read more on WYFF.

Category: Breach IncidentsGovernment SectorMalwareU.S.

Post navigation

← Large-Scale Health Data Breaches Declined in 2012 – So Far, Anyway
LG Site Developers, BravoPhone make “Legal” threats to ozdc.net →

1 thought on “Haley: SCDOR hacking may not have been preventable”

  1. IA Eng says:
    November 16, 2012 at 12:33 pm

    One thing that IT Training has taught me is that if a senior member is going to speak, that they should be informed by someone who kows technically about the system. The person who briefed the govenor was just as clueless as the govenor himself. Both appear to be only mildly familiar with the threats that occur almost daily. I wonder if there is ANY mandatory IT training that has to occur for state officials like Phishing, virus, social engineering or the like.

    Commmon, could not have been prevented? Social Engineering CAN be prevented. Setting security archetecture CAN prevent some files from passing through. Designing a network archetecture that has computer assets in a ring of trust CAN happen. Call it laziness, incompetence, inadequate training, poor security, lack of ethics or whatever it truly is. One thing for certain – it could very well happen again should the cause of the issue go uncorrected.

    Typically if there is an issue like this, sometimes – not always – there are other galring issues that exist as well. I don’t know what it is about big business – they lack the “guts” to bring in a third party to get an assessment of their network security. The cost of the assessment is FAR LOWER than a cost of a breach, and it shows due diligence.

    If it was me sitting there having a relaible source tell me to brief that it looks like the breach could not have been prevented, I would be SERIOUSLY worried about the infrastucture around the individuals that say this. To me it it sounds like either they lack the security knowledge, they want to cover something up, they don’t care about security and refuse to dump any cash into something to protect the network.

    Whatever the true outcome is, an understanding of security from the Top-down approach needs to be in place.

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Ransomware Attack on ADP Partner Exposes Broadcom Employee Data
  • Anne Arundel ransomware attack compromised confidential health data, county says
  • Australian national known as “DR32” sentenced in U.S. federal court
  • Alabama Man Sentenced to 14 Months in Connection with Securities and Exchange Commission X Hack that Spiked Bitcoin Prices
  • Japan enacts new Active Cyberdefense Law allowing for offensive cyber operations
  • Breachforums Boss “Pompompurin” to Pay $700k in Healthcare Breach
  • HHS Office for Civil Rights Settles HIPAA Cybersecurity Investigation with Vision Upright MRI
  • Additional 12 Defendants Charged in RICO Conspiracy for over $263 Million Cryptocurrency Thefts, Money Laundering, Home Break-Ins
  • RIBridges firewall worked. But forensic report says hundreds of alarms went unnoticed by Deloitte.
  • Chinese Hackers Hit Drone Sector in Supply Chain Attacks

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Massachusetts Senate Committee Approves Robust Comprehensive Privacy Law
  • Montana Becomes First State to Close the Law Enforcement Data Broker Loophole
  • Privacy enforcement under Andrew Ferguson’s FTC
  • “We would be less confidential than Google” – Proton threatens to quit Switzerland over new surveillance law
  • CFPB Quietly Kills Rule to Shield Americans From Data Brokers
  • South Korea fines Temu for data protection violations
  • The BR Privacy & Security Download: May 2025

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.