Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Tuesday, 28 March, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Instacart data reportedly safe despite initial concerns during a third-party check

Out of caution, Instacart notifies of potential breach

by The Gurus
September 4, 2020
in Cyber Bites
Breach
Share on FacebookShare on Twitter

It was initially reported that the sensitive data on almost 2000 Instacart shoppers may have been exposed to third-party contractors who were providing IT and Security support. However, as information has come to light, Instacart has revealed that no customer information or profiles were accessed or impacted.

Instacart released a press release which states the two employees from a third-party contractor “may have reviewed more shopper profiles than was necessary in their roles as support agents.”

It is believed once Instacart had uncovered the intrusion the retailer had contacted a forensic analysis firm to investigate. It stated no shopper data was stored, downloaded or digitally copied in any way and no customer information or profiles were accessed or affected.

Instacart has since stated: “During a recent review of support protocols, we determined that two employees retained by one of our third-party support vendors may have viewed more shopper profile information than was necessary in their roles as support agents. We’ve concluded that no shopper data was stored, downloaded or digitally copied in any way, and no customer information or profiles were accessed or impacted. That said, we have zero tolerance for anyone who abuses their role and that extends to our third-party vendors. As a result, we worked with this third-party support vendor to ensure their two employees never work on behalf of Instacart again, and have since ceased local operations with this vendor indefinitely.”

The following cybersecurity experts had their say on the incident:

Keith Geraghty, solutions architect at Edgescan:

“​You can conduct all the vetting in the world of your employees, but it is not a sure fire way to protect yourself from these type of issues. What will help is good compliance standards. In technical terms that means enforcing least privilege, keeping and reviewing logs and having the correct security awareness training to all staff. It is not clear from the article if any malicious intent was involved, so we are yet to find out if the action taken was on the strong side. You cannot leave the door the wide open and expect that everyone will pass by and not take a peek in.”
Martin Jartelius, CSO at Outpost24:

“Looking at countries that log these breaches with great care, we cannot see the insider breaches where individuals access data to which they have permission to do so, however, without business justification is relatively common. Cases can be seen by police, in medical care and more. The interesting part is that this is generally only detected where there are strict requirements for logging and auditing, there is no reason to suspect that police or medical care, or in this case support workers, are more inclined to such breaches, but rather that if you look for deviations, you shall find deviations. This speaks nicely in favor of a good practice of logging and auditing where the breach occurred.”

FacebookTweetLinkedIn
Share1TweetShare
Previous Post

Submit your nominations now for the Most inspiring Women in Cyber 2020

Next Post

Cybersecurity has become the fastest growing start-up sector in UK

Recent News

Synopsys discover new vulnerability in Pluck Content Management System

Synopsys discover new vulnerability in Pluck Content Management System

March 24, 2023
Dole Food Company

Dole confirms employee data was breached following February ransomware attack

March 24, 2023
call centre

MyCena Improves Customer Data Access Protection in Call Centers and BPOs

March 23, 2023
Blue logo, capitalised letters. SPECOPS.

Fortune 500 Company Names Found in Compromised Password Data

March 23, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information