A website has claimed to have posted subscriber data of Reliance Jio customers, including email IDs, names and Aadhaar numbers, on the website magicapk.com. While it couldn’t be confirmed whether the data related to all of Jio’s 120 million subscribers was uploaded, queries made through the website for some older numbers returned with information of all the fields.
A website has claimed to have posted subscriber data of Reliance Jio customers, including email IDs, names and Aadhaar numbers, on the website magicapk.com. Hours after the initial reports of the data being posted on the website on Sunday, it was suspended.
A recent study revealed that healthcare data breaches accounted for 39 percent of data breaches in 2015.
Healthcare data breaches were the most common type of data security incident reported in 2015, according to a recent study by Symantec Corporation.
Researchers found that approximately 39 percent of breaches during the year occurred in the health services sub-sector.
“This comes as no surprise, given the strict rules within the healthcare industry regarding reporting of data breaches,” explained the authors of the study. “However, the number of identities exposed is relatively small in this industry. Such a high number of breaches with low numbers of identities tends to show that the data itself is quite valuable to warrant so many small breaches.”
85% of organizations worldwide experienced an internal information security incident last year, some of which led to sensitive data loss, according to the Global Corporate IT Security Risks 2013 survey carried out by the B2B International research agency and Kaspersky Lab. The survey found that the three most common types of internal threats are: vulnerabilities or flaws in existing software, accidental leaks of data due to human error, and the loss or theft of mobile devices.
Most companies around the globe understand the importance of IT security preventive measures and implement them to varying degrees. In order to minimize internal security risks, half of the organizations surveyed have network structures that, for example, separate mission-critical networks from other networks and 52% use different levels of access privilege to IT systems.
However, many companies admit that existing measures are insufficient and some are increasingly implementing new security solutions which could enforce policies and provide additional protection from data loss. For instance, less than half the companies surveyed use application control, device control or an anti-malware agent for mobile devices. Even fewer organizations have implemented a Mobile Device Management solution (24%) or encryption on removable devices (33%).
Another problem is that employees do not always comply with existing corporate security policies, and less than half of companies (46%) have clearly outlined sanctions and disciplinary procedures for when IT security policies are breached. Meanwhile, just under half (48%) of the companies polled feel that security policies actually bring any value to the staff.