
{"id":2701,"date":"2013-10-31T00:00:00","date_gmt":"2013-10-31T00:00:00","guid":{"rendered":"http:\/\/otava.test\/avoiding-a-high-profile-breach-with-preventative-it\/"},"modified":"2013-10-31T00:00:00","modified_gmt":"2013-10-31T00:00:00","slug":"avoiding-a-high-profile-breach-with-preventative-it","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/avoiding-a-high-profile-breach-with-preventative-it\/","title":{"rendered":"Avoiding a High Profile Breach with Preventative IT"},"content":{"rendered":"<p dir=\"ltr\">The Adobe hack originally reported earlier this month turns out to have affected 38 million total users, including financial and personal account data. Adobe claims the 2.9 initially reported had their credit cardholder data compromised, while the additional millions had their encrypted passwords stolen. In addition, a letter to Adobe customers claims that hackers may have even used their systems to decrypt some of the passwords.<\/p>\n<p dir=\"ltr\">While merely speculative during early investigations, it has been recently verified that the source code for Adobe ColdFusion, Acrobat, Reader, and Photoshop have been stolen and posted online. Photoshop\u2019s source code appeared to be unencrypted, according to TheVerge.com.<\/p>\n<p dir=\"ltr\">As I\u2019d originally wrote about in <em><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/source-code-encrypted-data-stolen-as-2-9-million-affected-in-adobe-breach\/\">Source Code, Encrypted Data Stolen as 2.9 Million Affected in Adobe Breach<\/a><\/em>, compromised source code is serious business since a breach of an end user product allows hackers to write new malware and viruses for said product, and use them to access sensitive\/confidential corporate or personal data.<\/p>\n<p dir=\"ltr\">JDSupra Law News has deemed 2013 as the \u201cYear of the Mega Breach Cybersecurity Awareness Month\u201d due to the sheer size and litany of big-name breaches in the past few months alone &#8211; they name the seven biggest breaches of the year to include:<\/p>\n<ol>\n<li>Adobe; 2.9m records, 38m personal account data<\/li>\n<li>Livingsocial; 50m records<\/li>\n<li>Evernote; 50m recordsFacebook; 6m records<\/li>\n<li>Washington State Courts; 1m drivers\u2019 license numbers<\/li>\n<li>Schucks (grocery store chain); 2m credit cards<\/li>\n<li>Drupal.org; 1m records<\/li>\n<\/ol>\n<p dir=\"ltr\">In addition to the New York Times, Federal Reserve, PHP.net, and many others were hacked. With healthcare, financial and pharmaceutical companies being targeted, the proliferation of high profile breaches is continuing to escalate data breach costs. The breakdown of per capita data breach costs by industry can be seen in <em><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/2013-healthcare-data-breaches-cost-71-more-than-the-average-data-breach\/\">2013 Healthcare Data Breaches Cost 71% More Than The Average Data Breach.<\/a><\/em><\/p>\n<p dir=\"ltr\">What can a company or organization do to protect against the threat of an attack on their systems? Layer up with security and create a comprehensive <a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\">defense in depth<\/a> solution that ties together log and <a href=\"https:\/\/www.onlinetech.com\/secure-hosting\/technical-security\/file-integrity-monitoring-fim\">file monitoring<\/a>, <a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\">two-factor authentication<\/a>, <a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\">patch management<\/a>, <a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\">vulnerability scanning<\/a> and other <a href=\"https:\/\/www.onlinetech.com\/secure-hosting\/technical-security\">technical security<\/a> tools that can potentially detect and prevent a data breach of proprietary or sensitive data. Weigh the cost-benefit analysis of preventative IT and the potential cost per record of a data breach in your respective industry &#8211; a little bit of good security can go a long way.<\/p>\n<p>References:<br \/>\n<a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/2013-healthcare-data-breaches-cost-71-more-than-the-average-data-breach\/\">Adobe Hack Much Worse Than Reported, Hits 38 Million Passwords and Photoshop Source Code<\/a><br \/>\n<a href=\"https:\/\/www.jdsupra.com\/legalnews\/2013-year-of-the-mega-breach-cybersecur-17477\/?utm_source=jds&amp;utm_medium=twitter&amp;utm_campaign=tech\">2013: Year of the Mega Breach Cybersecurity Awareness Month &#8211; A Good Time for a Crisis Audit<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Adobe hack originally reported earlier this month turns out to have affected 38 million total users, including financial and personal account data. Adobe claims the 2.9 initially reported had their credit cardholder data compromised, while the additional millions had their encrypted passwords stolen. In addition, a letter to Adobe customers claims that hackers may have even used their systems to decrypt some of the passwords. While merely speculative during early investigations, it has been recently verified that the source code for Adobe ColdFusion, Acrobat, Reader, and Photoshop have been stolen and posted online. Photoshop\u2019s source code appeared to be unencrypted, according to TheVerge.com. As I\u2019d originally wrote about in Source Code, Encrypted Data Stolen as 2.9 Million Affected in Adobe Breach, compromised source code is serious business since a breach of an end user product allows hackers to write new malware and viruses for said product, and use them to access sensitive\/confidential corporate or personal data. JDSupra Law News has deemed 2013 as the \u201cYear of the Mega Breach Cybersecurity Awareness Month\u201d due to the sheer size and litany of big-name breaches in the past few months alone &#8211; they name the seven biggest breaches of the year to&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[59],"tags":[],"other_category":[],"class_list":["post-2701","post","type-post","status-publish","format-standard","hentry","category-information-technology-tips"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Avoiding a High Profile Breach with Preventative IT | OTAVA<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/avoiding-a-high-profile-breach-with-preventative-it\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Avoiding a High Profile Breach with Preventative IT\" \/>\n<meta property=\"og:description\" content=\"The Adobe hack originally reported earlier this month turns out to have affected 38 million total users, including financial and personal account data. Adobe claims the 2.9 initially reported had their credit cardholder data compromised, while the additional millions had their encrypted passwords stolen. In addition, a letter to Adobe customers claims that hackers may have even used their systems to decrypt some of the passwords. While merely speculative during early investigations, it has been recently verified that the source code for Adobe ColdFusion, Acrobat, Reader, and Photoshop have been stolen and posted online. Photoshop\u2019s source code appeared to be unencrypted, according to TheVerge.com. As I\u2019d originally wrote about in Source Code, Encrypted Data Stolen as 2.9 Million Affected in Adobe Breach, compromised source code is serious business since a breach of an end user product allows hackers to write new malware and viruses for said product, and use them to access sensitive\/confidential corporate or personal data. JDSupra Law News has deemed 2013 as the \u201cYear of the Mega Breach Cybersecurity Awareness Month\u201d due to the sheer size and litany of big-name breaches in the past few months alone &#8211; they name the seven biggest breaches of the year to...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/avoiding-a-high-profile-breach-with-preventative-it\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2013-10-31T00:00:00+00:00\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/avoiding-a-high-profile-breach-with-preventative-it\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/avoiding-a-high-profile-breach-with-preventative-it\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"Avoiding a High Profile Breach with Preventative IT\",\"datePublished\":\"2013-10-31T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/avoiding-a-high-profile-breach-with-preventative-it\/\"},\"wordCount\":428,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"articleSection\":[\"Information Technology Tips\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/avoiding-a-high-profile-breach-with-preventative-it\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/avoiding-a-high-profile-breach-with-preventative-it\/\",\"url\":\"https:\/\/www.otava.com\/blog\/avoiding-a-high-profile-breach-with-preventative-it\/\",\"name\":\"Avoiding a High Profile Breach with Preventative IT | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"datePublished\":\"2013-10-31T00:00:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/avoiding-a-high-profile-breach-with-preventative-it\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/avoiding-a-high-profile-breach-with-preventative-it\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/avoiding-a-high-profile-breach-with-preventative-it\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Avoiding a High Profile Breach with Preventative IT\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Avoiding a High Profile Breach with Preventative IT | OTAVA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/avoiding-a-high-profile-breach-with-preventative-it\/","og_locale":"en_US","og_type":"article","og_title":"Avoiding a High Profile Breach with Preventative IT","og_description":"The Adobe hack originally reported earlier this month turns out to have affected 38 million total users, including financial and personal account data. Adobe claims the 2.9 initially reported had their credit cardholder data compromised, while the additional millions had their encrypted passwords stolen. In addition, a letter to Adobe customers claims that hackers may have even used their systems to decrypt some of the passwords. While merely speculative during early investigations, it has been recently verified that the source code for Adobe ColdFusion, Acrobat, Reader, and Photoshop have been stolen and posted online. Photoshop\u2019s source code appeared to be unencrypted, according to TheVerge.com. As I\u2019d originally wrote about in Source Code, Encrypted Data Stolen as 2.9 Million Affected in Adobe Breach, compromised source code is serious business since a breach of an end user product allows hackers to write new malware and viruses for said product, and use them to access sensitive\/confidential corporate or personal data. JDSupra Law News has deemed 2013 as the \u201cYear of the Mega Breach Cybersecurity Awareness Month\u201d due to the sheer size and litany of big-name breaches in the past few months alone &#8211; they name the seven biggest breaches of the year to...","og_url":"https:\/\/www.otava.com\/blog\/avoiding-a-high-profile-breach-with-preventative-it\/","og_site_name":"OTAVA","article_published_time":"2013-10-31T00:00:00+00:00","author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/avoiding-a-high-profile-breach-with-preventative-it\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/avoiding-a-high-profile-breach-with-preventative-it\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"Avoiding a High Profile Breach with Preventative IT","datePublished":"2013-10-31T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/avoiding-a-high-profile-breach-with-preventative-it\/"},"wordCount":428,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"articleSection":["Information Technology Tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/avoiding-a-high-profile-breach-with-preventative-it\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/avoiding-a-high-profile-breach-with-preventative-it\/","url":"https:\/\/www.otava.com\/blog\/avoiding-a-high-profile-breach-with-preventative-it\/","name":"Avoiding a High Profile Breach with Preventative IT | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"datePublished":"2013-10-31T00:00:00+00:00","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/avoiding-a-high-profile-breach-with-preventative-it\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/avoiding-a-high-profile-breach-with-preventative-it\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/avoiding-a-high-profile-breach-with-preventative-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"Avoiding a High Profile Breach with Preventative IT"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2701","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=2701"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2701\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=2701"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=2701"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=2701"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=2701"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}