Close Menu
5gantennas.org5gantennas.org
  • Home
  • 5G
    • 5G Technology
  • 6G
  • AI
  • Data
    • Global 5G
  • Internet
  • WIFI
  • 5G Antennas
  • Legacy

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

4 Best Wi-Fi Mesh Networking Systems in 2024

September 6, 2024

India is on the brink of a new revolution in telecommunications and can lead the world with 6G: Jyotiraditya Scindia

August 29, 2024

Speaker Pelosi slams California AI bill headed to Governor Newsom as ‘ignorant’

August 29, 2024
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram
5gantennas.org5gantennas.org
  • Home
  • 5G
    1. 5G Technology
    2. View All

    Deutsche Telekom to operate 12,500 5G antennas over 3.6 GHz band

    August 28, 2024

    URCA Releases Draft “Roadmap” for 5G Rollout in the Bahamas – Eye Witness News

    August 23, 2024

    Smart Launches Smart ZTE Blade A75 5G » YugaTech

    August 22, 2024

    5G Drone Integration Denmark – DRONELIFE

    August 21, 2024

    Hughes praises successful private 5G demo for U.S. Navy

    August 29, 2024

    GSA survey reveals 5G FWA has become “mainstream”

    August 29, 2024

    China Mobile expands 5G Advanced, Chunghwa Telecom enters Europe

    August 29, 2024

    Ateme and ORS Boost 5G Broadcast Capacity with “World’s First Trial of IP-Based Statmux over 5G Broadcast” | TV Tech

    August 29, 2024
  • 6G

    India is on the brink of a new revolution in telecommunications and can lead the world with 6G: Jyotiraditya Scindia

    August 29, 2024

    Vodafonewatch Weekly: Rural 4G, Industrial 5G, 6G Patents | Weekly Briefing

    August 29, 2024

    Southeast Asia steps up efforts to build 6G standards

    August 29, 2024

    Energy efficiency as an inherent attribute of 6G networks

    August 29, 2024

    Finnish working group launches push for 6G technology

    August 28, 2024
  • AI

    Speaker Pelosi slams California AI bill headed to Governor Newsom as ‘ignorant’

    August 29, 2024

    Why Honeywell is betting big on Gen AI

    August 29, 2024

    Ethically questionable or creative genius? How artists are engaging with AI in their work | Art and Design

    August 29, 2024

    “Elon Musk and Trump” arrested for burglary in disturbing AI video

    August 29, 2024

    Nvidia CFO says ‘enterprise AI wave’ has begun and Fortune 100 companies are leading the way

    August 29, 2024
  • Data
    1. Global 5G
    2. View All

    Global 5G Enterprise Market is expected to be valued at USD 34.4 Billion by 2032

    August 12, 2024

    Counterpoint predicts 5G will dominate the smartphone market in early 2024

    August 5, 2024

    Qualcomm’s new chipsets will power affordable 5G smartphones

    July 31, 2024

    Best Super Fast Download Companies — TradingView

    July 31, 2024

    Crypto Markets Rise on Strong US Economic Data

    August 29, 2024

    Microsoft approves construction of third section of Mount Pleasant data center campus

    August 29, 2024

    China has invested $6.1 billion in state-run data center projects over two years, with the “East Data, West Computing” initiative aimed at capitalizing on the country’s untapped land.

    August 29, 2024

    What is the size of the clinical data analysis solutions market?

    August 29, 2024
  • Internet

    NATO believes Russia poses a threat to Western internet and GPS services

    August 29, 2024

    Mpeppe grows fast, building traction among Internet computer owners

    August 29, 2024

    Internet Computer Whale Buys Mpeppe (MPEPE) at 340x ROI

    August 29, 2024

    Long-term internet computer investor adds PEPE rival to holdings

    August 29, 2024

    Biden-Harris Administration Approves Initial Internet for All Proposals in Mississippi and South Dakota

    August 29, 2024
  • WIFI

    4 Best Wi-Fi Mesh Networking Systems in 2024

    September 6, 2024

    Best WiFi deal: Save $200 on the Starlink Standard Kit AX

    August 29, 2024

    Sonos Roam 2 review | Good Housekeeping UK

    August 29, 2024

    Popular WiFi extender that eliminates dead zones in your home costs just $12

    August 29, 2024

    North American WiFi 6 Mesh Router Market Size, Share, Forecast, [2030] – அக்னி செய்திகள்

    August 29, 2024
  • 5G Antennas

    Nokia and Claro bring 5G to Argentina

    August 27, 2024

    Nokia expands FWA portfolio with new 5G devices – SatNews

    July 25, 2024

    Deutsche Telekom to operate 12,150 5G antennas over 3.6 GHz band

    July 24, 2024

    Vodafone and Ericsson develop a compact 5G antenna in Germany

    July 12, 2024

    Vodafone and Ericsson unveil new small antennas to power Germany’s 5G network

    July 11, 2024
  • Legacy
5gantennas.org5gantennas.org
Home»Data»AT&T Wireless Data Breach: A Wake-up Call for Strengthened Cloud Security and Trust
Data

AT&T Wireless Data Breach: A Wake-up Call for Strengthened Cloud Security and Trust

5gantennas.orgBy 5gantennas.orgAugust 19, 2024No Comments5 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email


In a year that has seen a steady stream of cybersecurity incidents in the headlines, AT&T Wireless is one of the latest organizations to admit it was affected by a major data breach. The company acknowledged in July that call and text logs for 109 million wireless users were improperly obtained from third-party provider Snowflake’s cloud. The stolen records included every number that AT&T Wireless users called or texted with, as well as the locations of cell sites. AT&T said in a filing with the Securities and Exchange Commission (SEC) that an internal investigation uncovered the data theft in April.

Since data security directly correlates with building trust, what lessons can we learn from the AT& Wireless breach as we look to strengthen our cloud security defenses?

Todd Moore

Social Links Navigation

Thales, the global leader in data security.

Beyond regulatory requirements

This recent third-party breach is a reminder that compliance with cybersecurity standards is not just a regulatory requirement, but a fundamental requirement for protecting all sensitive data. In fact, Thales’ latest Data Threat Report found that companies that fail compliance checks are 10 times more likely to suffer a data breach than those that do. Specifically, 84% of these companies report having some sort of breach history, and 31% say they experienced a breach within the past 12 months. The correlation is clear: compliance goes hand in hand with robust cybersecurity.

Companies with truly robust security continually assess their security posture, rather than viewing compliance as a check-box task that can be completed annually. This allows them to regularly evaluate and audit their defenses and change how they authenticate their systems and data accordingly. This not only ensures compliance with new compliance requirements, but also keeps pace with evolving threats.

Thinking Beyond Yourself: Supply Chain

No company operates in a silo. They rely on contractors, suppliers, and vendors from different departments to function. But this interdependence also means that many other stakeholders are connected to the company’s network in some way. This means that even if your security measures are robust, they may fall short if a bad actor uses a third-party vulnerability in your supply chain as a gateway. In fact, this is exactly what happened in the case of AT&T Wireless, when their third-party software was compromised.

In addition to strict access controls to segment access to sensitive data, you also need to assess the security of your suppliers themselves. Mandating cybersecurity compliance will give you a clear picture of whether your stakeholders have taken the necessary measures and can be considered trustworthy suppliers. The security of people in your supply chain should also be considered when conducting business risk assessments, monitoring for threats, and performing tabletop exercises to simulate attacks.

Understanding the data

Understanding what data resides within your network, in this case phone numbers, may seem like a very basic step, but it is a vital step to truly understand your risk landscape.

Subscribe to the TechRadar Pro newsletter for all the top news, opinions, features and guidance you need to succeed in your business.

It’s wise to start by conducting an audit to understand what data is managed, where it’s stored, and what safeguards are in place to protect it. From there, you can classify assets based on their risk state, assess current vulnerabilities and potential risks, and address weaknesses in your data protection mechanisms.

Prioritize strong defense and proactive monitoring

Strong encryption, regular software updates, multi-factor authentication (MFA), and identity management systems are just some of the basic measures organizations need to take to reduce the risk of a breach or exposure. And, worryingly, less than 10% of companies say they encrypt more than 80% of their sensitive cloud data, highlighting how important pervasive encryption is for data at rest or in transit. But having a strong defense is only part of the solution.

Because human error is the leading cause of cloud data breaches, continuous monitoring of your activities and posture is another fundamental line of defense in case a threat actor gains access to credentials. This proactive approach automates the detection of non-compliant, risky, or suspicious data access behavior to prevent intrusions.

Security by Design

Cyber ​​threats are constantly evolving, and the only way organizations can stay ahead of the curve is to adopt a security-by-design approach to cybersecurity, integrating security into every stage of system development. This proactive stance allows vulnerabilities to be addressed from the start, reducing the likelihood of them being exploited, rather than retroactively introducing new countermeasures into legacy software and hardware.

This approach should form part of a broader security strategy that includes multi-layered security measures such as MFA, encryption and continuous monitoring to provide even greater protection. Relying on a single point of failure is dangerous for any business protecting critical information. Instead, organizations should diversify their defenses so that multiple points of failure would need to be compromised for a malicious actor to gain access.

lastly

The number of businesses whose sensitive data is being targeted is exploding. AT&T Wireless is one of several large companies that have suffered cybersecurity breaches in recent years, and unfortunately, it won’t be the last. However, we are at a crossroads to take actionable steps to mitigate those risks. A multifaceted, proactive and constantly evolving approach is required.

And there’s good reason to act now. Not only should the financial impact of such a breach and the loss of valuable intellectual property be underestimated, but the reputational damage and cascading loss of customer trust should also not be underestimated. Security helps companies build trust with consumers, but stories like the AT&T breach show how easily that trust can be shattered and reputations tarnished.

We list the best patch management software.

This article was produced as part of TechRadarPro’s Expert Insights channel, featuring the best and brightest minds in technology today. Opinions expressed here are those of the author and not necessarily those of TechRadarPro or Future plc. If you’re interested in contributing, find out more here. https://www.techradar.com/news/submit-your-story-to-techradar-pro



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleThere’s an affordable alternative to the Super 6G stealth fighter
Next Article AI-based Bitcoin mining and its challenges
5gantennas.org
  • Website

Related Posts

Crypto Markets Rise on Strong US Economic Data

August 29, 2024

Microsoft approves construction of third section of Mount Pleasant data center campus

August 29, 2024

China has invested $6.1 billion in state-run data center projects over two years, with the “East Data, West Computing” initiative aimed at capitalizing on the country’s untapped land.

August 29, 2024

Comments are closed.

Latest Posts

4 Best Wi-Fi Mesh Networking Systems in 2024

September 6, 2024

India is on the brink of a new revolution in telecommunications and can lead the world with 6G: Jyotiraditya Scindia

August 29, 2024

Speaker Pelosi slams California AI bill headed to Governor Newsom as ‘ignorant’

August 29, 2024

Crypto Markets Rise on Strong US Economic Data

August 29, 2024
Don't Miss

Apple focuses on 6G for future iPhones

By 5gantennas.orgDecember 11, 2023

iPhone 15 Pro and Pro MaxWith Apple’s recent listing of cellular platform architects to work…

All connectivity technologies will be integrated in the 6G era, says Abhay Karandikar, DST Secretary, ET Telecom

January 31, 2024

5G-Advanced and 6G networks require additional spectrum

January 24, 2024

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to 5GAntennas.org, your reliable source for comprehensive information on 5G technology, artificial intelligence (AI), and data-related advancements. We are passionate about staying at the forefront of these cutting-edge fields and bringing you the latest insights, trends, and developments.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

4 Best Wi-Fi Mesh Networking Systems in 2024

September 6, 2024

India is on the brink of a new revolution in telecommunications and can lead the world with 6G: Jyotiraditya Scindia

August 29, 2024

Speaker Pelosi slams California AI bill headed to Governor Newsom as ‘ignorant’

August 29, 2024
Most Popular

Will 5G make 2024 the most connected year in the industry?

December 1, 2023

The current state of 5G in the US and how it can improve

September 28, 2023

How 5G technology will transform gaming on the go

January 31, 2024
© 2025 5gantennas. Designed by 5gantennas.
  • Home
  • About us
  • Contact us
  • DMCA
  • Privacy Policy
  • About Creator

Type above and press Enter to search. Press Esc to cancel.