Target is planning to settle a class-action lawsuit filed after the retailer’s 2013 data breach. The company has created a $10 million fund for those affected. VPC
Shoppers arrive at a Target store in Los Angeles on Thursday, Dec. 19, 2013. Target says that about 40 million credit and debit card accounts may have been affected by a data breach that occurred just as the holiday shopping season shifted into high gear.(Photo: AP)
South Dakota will collect $174,248 from Target for a Black Friday data breach that exposed millions of consumers to identity theft. Attorney General Marty Jackley inked a settlement this week along with his counterparts in 46 other states in response to the data breach, one of the largest in U.S. history. The total settlement amounts to $18.5 million, to be split among the states.
Hackers used a third-party vendor s credentials to log in to Target s gateway server, then planted malware that exploited flaws in Target s network to nab names, addresses, phone numbers, credit card numbers, CVV1 codes and personal identification numbers. In the end, more than 110 million records were compromised. In addition to the payments, the settlement required Target to tighten its security and encryption programs and maintain them in the future.
The hack and the settlement are a reminder for consumers to check their bank and credit accounts, as well as their own credit reports, for suspicious activity, according to South Dakota’s Attorney General.
This is a strong reminder that data breaches are sadly becoming more common and we must all guard against those who attempt to take personal identifying information and cause financial harm, Jackley said in a prepared statement.
Consumers can check their credit for free once at year at AnnualCreditReport.com or by calling 1-877-322-8228. Credit reports are also available through the three nationwide credit reporting agencies: Equifax, Experian and TransUnion.
Read or Share this story: http://www.argusleader.com/story/news/2017/05/23/target-pay-s-d-174-248-black-friday-data-breach/339429001/
An organization s most vital and secured systems are placed into the hands of a third party (very often an MSP) to manage and maintain. It is an MSP s responsibility to keep the comprehensive IT operations from the network to applications and systems of an organization secure. As an MSP, offering an organization the added security of protecting against insider threats for data breaches and compromised sensitive data can be the difference between scoring or losing a customer.
This has become such a prevalent worry among enterprises that, according to a Vormetric Insider Threat Report, 91 percent of C-level executives confirmed that their organizations were being left vulnerable to insider threats.
So what exactly is an insider threat and how can an MSP become an expert at preventing it?
According to Digital Guardian, an insider threat is most simply defined as a security threat that originates from within the organization being attacked or targeted, often an employee or officer of an organization or enterprise. Understanding insider threats all comes down to the ability to help a client company identify their sensitive company information, monitor users that have access to the information, and being a part of the training and restricting process for employees. As knowledge of insider threats continues to grow, so does the demand for experts on the subject, and solutions to company challenges.
How can an MSP help clients develop insider threat programs and provide a solution?
- Identify sensitive company information and monitor users that have access MSPs need to work together with organizations to help them identify and mark their most sensitive data. This allows an MSP to implement an approach that makes user behavior the focal point of the process of helping companies identify high-risk employees and carefully monitoring behavior. Many organizations are under the false impression that providing employees with login credentials and passwords, as well as limiting security and access permissions will ensure data protection. But without a monitoring and tracking system in place, unauthorized internal data access can easily occur through a colleague s computer, and employees can share classified materials without being detected.
- Always encrypt any data you re responsible for and encourage the company to encrypt its own data Encryption can now be counted amongst the key layers of internal defense necessary to protecting data, both internally and externally. Organizations can maintain document security, even if their data has already been breached internally, if the files have been effectively encrypted. MSPs need to make sure that their clients have these precautions in place in the event that data is exfiltrated.
- Training, restricting and defense is a must While in this day and age it seems like an obvious assumption that organizations need to take precautions by banning the use of personal and external devices on site USB sticks, unauthorized web apps, and cameras it s in an MSP s best interests to use and recommend a system or software that can monitor and block these types of activities. This may also include limiting access to certain websites, setting bandwidth restrictions, limiting file sharing permissions and more. It s also very important for an MSP to have good communication with the IT manager and help with education about safe IT security practices.
- Be aware of other third parties As an MSP, you have to be aware that other companies may have access to sensitive systems and data within the company you’re managing. Make sure to extend and implement the same rules, protocols, and monitoring systems for third party vendors that you will need to work with. It s important to communicate these protocols to management in order to make sure all sides are covered. Consider this case in point: among 874 incidents, as reported by companies to the Ponemon Institute for its recent 2016 Cost of Data Breach Study, 568 were caused by employee or contractor negligence. As an MSP, make sure you ve communicated the need to monitor third party vendors to your client and have protected yourself.
At the end of the day, the most important concept to keep in mind is that the best offense is a good defense. Every MSP should make this clear to their client. While establishing these critical layers of defense may seem somewhat tedious and time consuming, it is insignificant in comparison with the average detection time, damage incurred and epic cost attributed to recovering from an internal breach.
Isaac Kohen is founder and CEO of Teramind, an employee monitoring and insider threat prevention platform that detects, records, and prevents, malicious user behavior. He can be reached at [email protected].
Well, Twin Peaks fans, I don t think we re in Twin Peaks anymore. The first episode of what is technically the third season of the cult 90’s show on Showtime leaves more questions than answers (what else did you expect?) and sees the strange world of the original newly expanded. The kick-off for season three takes us through four different, but interconnected, storylines, only one of which takes places Twin Peaks, while the other three take place in South Dakota, New York, and the famous Red Room at the Black Lodge in its strange limbo world. The small-town hijinks and camp of the original don t feature so heavily in this reboot, though don t get me wrong this one has its camp moments, too. But with its multiple storylines, disposable characters, and moody, self-serious black humor, it feels spiritually much more akin to David Lynch s films like Mulholland Drive, also originally meant to be a TV series.
It s as if the most confusing plot elements of the original Twin Peaks have been dialed up to 100 and let loose on the rest of America. So basically, it s a wild ride for fans of the show and completely nonsensical to anyone else. (Nb: What, if any, did the network notes look like on this? Maybe make Red Room less completely absurd and foreboding of unspeakable doom? BTW: What is Red Room? Necessary? The more likely version: Uh. OK! )
Carel Struyckenin a still from Twin Peaks. Photo: Suzanne Tenner/SHOWTIME
Still, it s part of a clear recipe in prestige TV, from Fargo to I Love Dick, of taking original material and swelling its world to fit the ever-expanding storylines and scope essential to an episodic series. More is more; results may vary. Or as the Log Lady said, Where there was once one, there are now two. Or were there always two?
After a prelude taken from the original series Laura Palmer s now-prescient promise to Special Agent Dale Cooper, I ll see you again in 25 years the season opens in the Red Room, which feels appropriate. Dale Cooper (Kyle MacLachlan, who has aged well) has seemingly been trapped here for the last quarter century. Various personalities from the original appear and tell him cryptic pieces of advice, basically all alluding to the fact that Bob the demonic entity that originally possessed Leland Palmer and made him kill his daughter Laura is in the real world using Cooper s body. The Giant tells him to listen to the sounds, and, It all cannot be said aloud now. Mmkay.
Madeline Zima in a still from Twin Peaks. Photo: Suzanne Tenner/SHOWTIME
Maybe the most surprising development is that New York City plays a role, as we enter another storyline set in an amber-lit Gotham. In a nondescript brick building in Manhattan, a young man sits watching a glass box in a concrete bunker of a space . The glass box is connected to a small portal looking out on the city, as well as some very formidable-looking equipment. Cameras and screens surround the box. The man watches while sitting on a singular couch surrounded by boxes. Something is going to happen here, if you couldn t tell from the eerie, ever-growing hum.
Outside the door, a smiling woman named Tracy arrives bearing lattes as a security guard stares her down. But she s not allowed inside. The room is top secret. She persists, as she clearly has a crush on the guy, and offers to drop by again tomorrow.
Ashley Judd and Richard Beymer in a still from Twin Peaks. Photo: Suzanne Tenner/SHOWTIME
Back in Twin Peaks, Dr. Jacoby gets a big delivery of shovels to his trailer; Benjamin Horne has hired Beverly (new-to-show Ashley Judd) as his new assistant at the hotel and gets a visit from his druggie brother Jerry, who asks if he s sleeping with his recent hire yet; and at the sheriff s office, someone looking for Sheriff Truman gets soundly confused by kooky secretary Kimmy Robertson. Same old, same old.
Elsewhere, driving on a dark winding forest road is the Dale Cooper inhabited by Bob (let s call him Host Cooper). He s leathery and tan, with long hair and a leather jacket, and he s clearly on a mission. He rolls up to a wooden cabin where he promptly beats up a stooge standing guard and leaves hauling off two younger drifters, Ray and Daria.
Back in New York City, Tracy arrives at the strange building again with lattes, but the security guard is gone, so her suitor lets her in for a while. While she s amazed by the glass box setup, he admits that he doesn t know what it does he just took the job as a gig. He s supposed to see something, and apparently people have before, but he hasn t yet and can t talk about it. It doesn t take long until they start hooking up on the couch, as the glass box grows more and more prominent, the hum louder and louder until
Matthew Lillard in a still from Twin Peaks. Photo: Suzanne Tenner/SHOWTIME
The box goes black. A person, or humanoid, lurks inside it but before we can tell what it is, the thing breaks through the glass, fills the room like a fog, and tears up the couple s faces or that s what it looks like. It’s old-school, schlockily vague visual effects that fit perfectly in the world that is Twin Peaks. The overly CGI-ed Manhattan skylines, not so much.
In a new location, Buckhorn, North Dakota, there s a lot more weird small-town quirkiness than in Twin Peaks itself. The whole thing feels a little close to the Fargo reboot, as two cops discover through a series of comic interludes and bizarre townies that a woman named Ruth Davenport has been murdered in her apartment in a gruesome fashion. We get appearances by Jane Adams and Brent Briscoe (a Mulholland Drive alum) in the police force, and they find out that the prints in the apartment belong to Bill Hastings, the high school principal, a perfectly-cast Matthew Lillard.
Kyle MacLachlan in a still from Twin Peaks. Photo: Suzanne Tenner/SHOWTIME
Meanwhile, in Twin Peaks, Log Lady is making weird midnight phone calls to the police station (Log Lady!) in order to reach Deputy Hawk. My log has a message for you. Something is missing and you have to find it. It has to do with Special Agent Dale Cooper. Log Lady knows what s up; she s also, hint hint, posed next to a red lampshade.
After his arrest at his picture-perfect home in front of his khaki-clad wife, Hastings starts to crack under questioning at the station. Turns out Ruth Davenport was a librarian he knew, though he claims not well. It s obvious he s lying about something. His alibi for the last few days has some suspicious gaps. He looks increasingly nervous and aware of being watched, and asks what s going on. He looks genuinely shocked when he s told Ruth was murdered, while back at his house, police find a piece of human flesh in his trunk. Does Bob have a new, new host? Before we get any more answers, we re back at the Red Room with the Giant. Onto part two.
A Field Guide to Recognizing Your Favorite Twin Peaks Actors Now, 26 Years Later
Laura Dern, Naomi Watts, Patricia Arquette, and Hailey Gates Open Up About Working with Legendary Director David Lynch:
- ^ Twin Peaks (www.wmagazine.com)
- ^ David Lynch (www.wmagazine.com)
- ^ the original Twin Peaks (www.wmagazine.com)
- ^ I Love Dick (www.wmagazine.com)
- ^ Kyle MacLachlan, who has aged well (www.wmagazine.com)
- ^ Related: Laura Dern and Naomi Watts Open Up About David Lynch, And Tease Twin Peaks (www.wmagazine.com)
- ^ Read all W’s Twin Peaks coverage here. (www.wmagazine.com)