sb-as logo
Story image

Massive data leak in Czech Republic- and how to avoid one

21 Jun 2016

Over 1.5 million customer records at T-Mobile Czech Republic were stolen by one of its employees, according to local media.

In an official statement, T-Mobile admitted that an incident has taken place but refused to confirm the scale or provide details about what information, if any, was leaked.

It said that due to an ongoing police investigation, it is “unable to provide any additional specific information”.

Based on the fact that the investigation has been handed over to the Czech Police Unit for Combating Organised Crime, speculation has arisen in Czech media that the data leak has been massive.

It probably involved all 1.5 million T-Mobile customers, making it the largest known data breach ever in the Czech Republic. According to the operator’s spokesperson, the firm’s security controls were triggered “immediately” following the illegal activity (the copying of the customer database).

It remains unclear what happened with the data – T-Mobile claims that the perpetrator was caught when attempting to sell the database, while some media outlets claim that the data actually fell into the wrong hands.

According to a 2016 Ponemon Institute study, an average data breach causes damages worth $3.5 million to the affected company.

“Employees are the biggest threat factor to data – be it they trade secrets, customer payment data or personal information on customers or employees,” commented Petr Žikeš- CEO at Safetica Technologies, a data loss prevention company.

“Anything that can be easily exploited or monetised is in danger of being stolen.”

Safetica experts recommend the following steps to prevent incidents similar to what happened at T-Mobile Czech Republic:

  • Don’t underestimate insider threats
  • Monitor data flows in your organisation to reveal risky operations
  • Monitor your workers, applying a risk-based approach (i.e. closely follow those in probationary period or notice period)
  • Set and enforce rules for handling critical data
  • If data security is important for your organisation, then consider implementing a Data Loss Prevention solution

Article by an analyst for We Live Security

Story image
Global attack volume down, but fraud and cyber threats still going strong
“The move to digital, for both businesses and consumers, has been significant. Yet with this change comes opportunity for exploitation. Fraudsters look for easy targets: whether government support packages, new lines of credit or media companies with fewer barriers to entry."More
Story image
Jamf extends Microsoft collaboration with iOS Device Compliance
Organisations will soon be able to use Jamf for Apple ecosystem management while using Azure Active Directory and Microsoft Endpoint manager to maintain conditional access.More
Story image
IT leaders fear increase risk of cyber attacks while working from home
More than 80% of IT leaders believe their company is at a greater risk of cyber attacks when their staff are working from home, according to new research. More
Link image
How to leverage backup best practices to repel ransomware
Here's how a ransomware kit with a whitepaper, webinar and 30 day free trial can help your business effectively prevent, detect and restore from a ransomware attack.More
Story image
ESET launches the latest version of its Mobile Security solution
“With this latest version of ESET Mobile Security, we want to ensure our users feel completely secure when performing financial transactions on their devices, in addition to being protected from malware and phishing attempts."More
Story image
Gartner: Security leaders must balance risk, trust and opportunity
Security and risk leaders must focus on balancing risk, trust and opportunity to help maintain the ability of their organisations to function.More