Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Saturday, 3 June, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Sussex Police investigate multiple breaches after police and public data is accessed

by The Gurus
January 5, 2015
in Editor's News
Share on FacebookShare on Twitter

An external police network was breached over the Christmas period allowing for personal information of police officers and members of the public to be illegally accessed.
 
According to the Eastbourne Herald, Sussex Police is investigating security breaches of its external website which occured over the Christmas period. It found that there were three breaches within a contained area of the website and could possibly be linked.
 
Amaraghosha Carter, joint head of IT for Surrey and Sussex police forces, said: “A full investigation is underway to identify the source of the breaches and their impact. Those responsible have obtained email addresses of a number of officers and personal email addresses of some members of the public who have used the services of our website.
 
“Communications staff have contacted around 270 people who may have been affected, in particular to give them security advice in relation to their passwords for our community messaging service. Our website is entirely separate to those systems used to investigate crime.”
 
They also confirmed that the activity had not impacted on any other force IT, web or telephony systems and operational response is unaffected.
 
“There has been no impact on our service to the public. Measures are being put in place to ensure that the security of the website is not compromised further.
 
“Work is being carried out to ensure that all our IT systems remain resilient and secure and an investigation is under way to find those responsible.”
 
Commenting, Lancope CTO TK Keanini admitted that “everyone is a target”, especially following the compromise of a bus website last week.
 
He said: “The problem fundamentally is a race in knowledge: the criminals understand information technology better than law enforcement. Then it will go back the other way and back and forth we go as both of these crafts are brought into the information age.
 
“Law enforcement needs to not make information technology someone else’s job, but embrace it into their craft as information technology is woven in to our everyday lives.”
 
Keanini said that the statement about the networks being separate is good if it is true, but processes and detection must be put in place to ensure this is done on a minute by minute basis.
 
“Networks have a tendency to jump barriers and in this connected world, someone will make a mistake, or the adversary will find a way to connect two disparate networks and those statements of separation are no longer true,” he said. “If we want to protect data, we must employ encryption so that even when the data is in someone’s possession, it is still not available to the wrong person.”

FacebookTweetLinkedIn
Tags: attackdata breachPolice
ShareTweet
Previous Post

Brute force tool iDict could hit Apple iCloud users again

Next Post

Credit card and account information flaw existed on Moonpig for 17 months

Recent News

A Roadmap for Becoming a Penetration Tester in 2023

A Roadmap for Becoming a Penetration Tester in 2023

May 31, 2023
Electronic tablet with social media icons, hands holding screen.

Research Reveals UK Firms Plan to Embrace New Era of Digital Identity

June 1, 2023
AWS and Salt

Salt Security Attains AWS Security Competency Status 

May 31, 2023
Purple spiral circle. Text reads "Centripetal", san-serif.

Centripetal Extends Innovative CleanINTERNET® Technology to the Cloud

May 31, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information