{"id":4043,"date":"2019-08-06T17:20:24","date_gmt":"2019-08-06T17:20:24","guid":{"rendered":"http:\/\/prototypes.transputec.net\/cynance-dev\/?p=4043"},"modified":"2022-07-15T13:44:59","modified_gmt":"2022-07-15T13:44:59","slug":"what-we-can-learn-from-the-capital-one-hack","status":"publish","type":"post","link":"https:\/\/outofsite.biz\/cynance\/what-we-can-learn-from-the-capital-one-hack\/","title":{"rendered":"What we can learn from the Capital One Hack?"},"content":{"rendered":"

[vc_row][vc_column][vc_column_text css=”.vc_custom_1582712047677{padding-bottom: 50px !important;}”]You probably heard of the enormous data breach suffered by Capital One, exposing personal data of nearly 106 million of the bank\u2019s customers. What should you take from it? Start with checking if you have taken the following measures to enhance your company\u2019s security resilience to unfortunate but sometimes inevitable situations: Create secure configuration standards documentation, following vendors\u2019 security best practices. Configure your cloud environment security settings accordingly, check your SLA with the cloud service providers and maintenance company, ensuring that your suppliers follow these standards as well. Schedule periodic security assessments to assess whether your intentions are turned into actions. Reduce unnecessary data collection. Define data retention periods and abide by them. This will reduce the attack surface and the potential scope for attackers. The last but not the least, prepare for a rainy day by creating and keeping up to date incident response procedures and training your team to follow them.[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"

You probably heard of the enormous data breach suffered by Capital One, exposing personal data of nearly 106 million of the bank\u2019s customers.<\/p>\n","protected":false},"author":8,"featured_media":8083,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[18],"tags":[],"_links":{"self":[{"href":"https:\/\/outofsite.biz\/cynance\/wp-json\/wp\/v2\/posts\/4043"}],"collection":[{"href":"https:\/\/outofsite.biz\/cynance\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/outofsite.biz\/cynance\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/outofsite.biz\/cynance\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/outofsite.biz\/cynance\/wp-json\/wp\/v2\/comments?post=4043"}],"version-history":[{"count":1,"href":"https:\/\/outofsite.biz\/cynance\/wp-json\/wp\/v2\/posts\/4043\/revisions"}],"predecessor-version":[{"id":8084,"href":"https:\/\/outofsite.biz\/cynance\/wp-json\/wp\/v2\/posts\/4043\/revisions\/8084"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/outofsite.biz\/cynance\/wp-json\/wp\/v2\/media\/8083"}],"wp:attachment":[{"href":"https:\/\/outofsite.biz\/cynance\/wp-json\/wp\/v2\/media?parent=4043"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/outofsite.biz\/cynance\/wp-json\/wp\/v2\/categories?post=4043"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/outofsite.biz\/cynance\/wp-json\/wp\/v2\/tags?post=4043"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}