Question

IT Law

employees regarding the risk of cybercrime attacks.”

Nedbank clients were in shock on Thursday morning, after it was reported that 1.7 million customers may have had their data breached. Nedbank client's identity numbers, addresses and contact details may have been breached after a "data security incident" at a direct marketing company. According to a statement, Nedbank said they have investigated a data security issue that occurred at the premises of a third-party service provider, namely Computer Facilities. Computer Facilities is a direct marketing company that issues SMS and email marketing information on behalf of Nedbank and a number of other companies. A subset of the potentially compromised data at Computer Facilities included personal information (names, ID numbers, telephone numbers, physical and/or email addresses) of some Nedbank clients. No Nedbank systems or client bank accounts have been compromised, the banking institution said. "Once we became aware of the issue, we engaged as a matter of urgency with the service provider and leading forensic experts to conduct an extensive investigation.” It should be noted that Nedbank identified the data security issue at Computer Facilities as part of our routine and ongoing monitoring procedures. "We have moved swiftly to proactively secure and destroy all Nedbank client information held by Computer Facilities. Information from Nedbank Retail relating to approximately 1,7 million clients were potentially affected of which 1,1 million are active clients." "This incident is isolated to the third-party service provider’s systems. As a further precautionary measure, Computer Facilities’ systems have been disconnected from the internet until further notice.” “We regret the incident that occurred at the third-party service provider, namely Computer Facilities and the matter is receiving our urgent attention. The safety and security of our clients’ information is a top priority. We take our responsibility to protect our client information seriously and our immediate focus has been on securing all Nedbank client data at Computer Facilities, which we have done. In addition to this, we are communicating directly with affected clients. We are also taking the necessary actions in close cooperation with the relevant regulators and authorities,” Nedbank CEO Mike Brown said. Nedbank Group Chief Information Officer Fred Swanepoel said: “Computer Facilities did not have any links to our systems. Our team of IT specialists and external cyber security experts have been working continuously with them since we became aware of this matter. Clients’ bank accounts have not been compromised in any manner whatsoever and clients have not suffered any financial loss. Nedbank remains vigilant in its efforts to contain cybercrime.” Nedbank said that they have advised Computer Facilities of their obligation to notify any of their other customers potentially impacted by the incident. Clients’ bank accounts are not at risk and they do not need to take any further action other than continuing to be vigilant against attempts at fraud.

Source: https://www.iol.co.za/personal-finance/my-money/banking/warning-if-you-are-a-nedbank-client-your-data-may-have-been-breached-42651750 [Accessed on 17/02/2020].


0 0
Add a comment Improve this question Transcribed image text
Request Professional Answer

Request Answer!

We need at least 10 more requests to produce the answer.

0 / 10 have requested this problem solution

The more requests, the faster the answer.

Request! (Login Required)


All students who have requested the answer will be notified once they are available.
Know the answer?
Add Answer to:
IT Law
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Similar Homework Help Questions
  • Law

    employees regarding the risk of cybercrime attacks.”Nedbank clients were in shock on Thursday morning, after it was reported that 1.7 million customers may have had their data breached. Nedbank client's identity numbers, addresses and contact details may have been breached after a "data security incident" at a direct marketing company. According to a statement, Nedbank said they have investigated a data security issue that occurred at the premises of a third-party service provider, namely Computer Facilities. Computer Facilities is a...

  • its true or false questions 1. A computer security risk is any event or action that...

    its true or false questions 1. A computer security risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability 2. A cybercrime is an online or Internet-based illegal act 3. Information transmitted over networks has a higher degree of security risk than information kept on an organization's premises 4. Users can take several precautions to protect their home and work computers and mobile devices from these malicious...

  • Data Performance, a computer software consulting company, has three major functional areas: computer programming, information systems...

    Data Performance, a computer software consulting company, has three major functional areas: computer programming, information systems consulting, and software training. Carol Bingham, a pricing analyst, has been asked to develop total costs for the functional areas. These costs will be used as a guide in pricing a new contract. In computing these costs, Carol is considering three different methods of the departmental allocation approach to allocate overhead costs: the direct method, the step method, and the reciprocal method. She assembled...

  • Cybersecurity Assessments Passwords are very important to protect our data and the various technologies we use...

    Cybersecurity Assessments Passwords are very important to protect our data and the various technologies we use on a daily basis to communicate. For this discussion I want you to go online and find a recent article that talks about an incident/hack that happened to an individual or a company that involved the use of passwords. Many people or organizations are not careful enough when it comes to protecting their systems and data. It is the responsability of the pen tester...

  • The main threats that physical security components combat are theft, interruptions to services, physical damage, compromised...

    The main threats that physical security components combat are theft, interruptions to services, physical damage, compromised systems and environment integrity, and unauthorized access. However, the information held within the equipment may be much more valuable than the equipment itself. Which controls we choose to use to mitigate risks to our information depend not only on the value we assign to that information, but also on the dynamic state of that information. Our data exists in one of three states: at...

  • ( Need 100 words summary this Article) Target’s headquarters in Minneapolis. A settlement by the company...

    ( Need 100 words summary this Article) Target’s headquarters in Minneapolis. A settlement by the company ended an investigation into how the data of millions of customers was compromised in 2013. By Rachel Abrams May 23, 2017 Target will pay $18.5 million to 47 states and the District of Columbia as part of a settlement with state attorneys general over a huge security breach that compromised the data of millions of customers. The settlement ends a yearslong investigation into how...

  • You are a manager in Nelson & Co., a firm of Chartered Certified Accountants, with three...

    You are a manager in Nelson & Co., a firm of Chartered Certified Accountants, with three offices and 12 partners. About one third of the firm’s clients are audit clients, the remainder are clients for whom Nelson & Co. performs tax, accounting and business advisory services. The firm is considering how to generate more revenue, and you have been asked to evaluate two suggestions made by the firm’s business development manager. An advertisement could be placed in national newspapers to...

  • "Each day before leaving our homes, we protect the property within. By locking our doors, closing...

    "Each day before leaving our homes, we protect the property within. By locking our doors, closing our windows, or activating our security systems, we go to great lengths to ensure that our homes have the necessary safeguards in place to thwart potential intruders and those who may try to steal our personal and precious belongings. When it comes to our confidential personal information, however, many of us fail to realize that this information is readily available and able to be...

  • Question 4: Activity Based Costing (20 marks in total) Black and Hollis perform consulting services related...

    Question 4: Activity Based Costing (20 marks in total) Black and Hollis perform consulting services related to e-commerce and information systems, in Adelaide. The firm, which bills $187.50 per hour for services performed, is in a very tight labour market and is having difficulty finding quality staff. The labour cost per hour paid by Black and Hollis for professional staff time is $67.50. Selected information follows: Billable hours for clients for the year totalled 5,000, consisting of information systems services,...

  • Outsourcing Vendor, SaaS Client Optimizing the allocation of resources for IT services sometimes creates unexpected situations....

    Outsourcing Vendor, SaaS Client Optimizing the allocation of resources for IT services sometimes creates unexpected situations. This is a story of a leading vendor of IT outsourcing that decided to outsource one of its own IT functions. More accurately, it relies on software as a service. Siemens AG is a German-based global corporation and one of the world's largest firms. It specializes in electronics and engineering. It employs 475,000 people in 190 countries, and reported revenue of $107.4 billion in...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT