Just yesterday, the cybersphere sustained another attack–this one targeting personal information and credit card data. The system of electronics retailer CeX was breached by hackers, causing a leak of its customers’ names, phone numbers, and even addresses, as well as encrypted credit card information. Because CeX is such a large firm with locations in countries across the world, up to 2 million people’s privacy was compromised from the attack.
Unfortunately, this CeX Hack is not an isolated occurrence. These kinds of cybersecurity breaches happen all the time, making it all the more crucial that corporations–and the individuals who work for them–take every proper precaution. This is where GLS can help. In a statement, CeX said that while it has always had measures in place to protect itself from these kinds of threats, “Clearly…additional measures were required to prevent such a sophisticated breach occurring and we have therefore employed a cybersecurity specialist to review our processes. Together we have implemented additional advanced measures of security to prevent this from happening again.” With a team of extremely qualified information security experts sporting many decades of combined experience, GLS can provide that additional expertise to prevent cybersecurity breaches. In addition to our team’s know-how, our training courses–meticulously crafted and then combined into comprehensive packages–will ensure that every part of your business is secure.
The steps for safeguarding such information: Assessing, Reducing, Protecting, Eliminating and Responding
What privacy laws are in place in different countries, and how they work
Financial penalties for compromise of personal information
Internet safeguards for dealing with credit card information, including email and password security
Social engineering strategies that target such information
Don’t put your clients’ information at risk. Employ GLS’ expertise and comprehensive courses to safeguard your business, and the private information of others, against hackers like those in the CeX Hack.
What Can You Do?
To learn more about how the data protection and the human element affects information security, we invite you to read a Gartner report, “How to Secure the Human Link.”
Request information on our course – Privacy and Data Protection Essentials