First Reference company logo

First Reference Talks

News and Discussions on Payroll, HR & Employment Law

decorative image

encryption keys

Slaw: Disgruntled former worker who hijacked network must pay city $1,485,791

In a recent survey of 500 information technology and data security workers, 40 percent said they could easily use their knowledge of encryption keys, shared passwords, weak controls and loopholes in data security programs to make off with information, or hold their organization’s data hostage. And 31 percent said that, even if they no longer worked for the company, with their knowledge of the systems they could access encryption keys and authorization codes and hack in remotely to snoop, secretly alter files or shut down the data system.

 

, , , , , , , , , , , , , , ,