SlideShare ist ein Scribd-Unternehmen logo
1 von 13
MWEB Business: Hacked
    Management Information Systems


                       10.12.2012
Outline

1. What technology issues led to the security breach at MWEB?

2. What is the possible business impact of this security breach
   for both MWEB and its customers?

3. If you were an MWEB customer, would you consider MWEB's
   response to the security breach to be acceptable?

4. What should MWEB do in the future to avoid similar incidents?
o South Africa’s 2nd largest Internet Service Provider

o Founded in 1997

o Divisions: MWEB Connect and MWEB Business

o Customer base:
   •   Home users
   •   Small, medium and large enterprises
   •   Corporate clients
Portfolio

o Tailored Business Solutions

o Personalized account management

o Own world class network infrastructure

o International connectivity redundancy

o Next generation data centers

o 24/7 Technical support
Security Measures

o Using AVG Internet Security as partner
o Identity protection
o LinkScanner (safe surfing)
o WebShield (safe social networking)
o Antiphishing, Antispam, Antivirus,
  Antispyware
o Enhanced firewall
o Automatic e-mail cleaning
o Blocking network ports commonly used by
  hackers
Dangerous Breach

Issue:
oCompromised subscribers account details
oPublished logon and password details



Reason
oHackers gained access to Web based Internet
Solutions’ self-service management system
o outsourced, not in total control
Data Management
Business Impact

o Notifying customers and find solution
o Determine reason for breach = interruption of business processes
o Work together with IS
o Lost trust of customers  gain back
o Implement proper policies and controls
o Prepare for legal, financial risks
o Threat to customer retention and reputation



          Very tricky process with

          intangible and tangible costs
Customer Impact

o Need for explanation
o Need for behavioral recommendations
o Loss of personal information (privacy)
o Data lost or inaccurate
o Additional compromising of related accounts
o Inconvenience: have to change password or
  could not access the service
o Lost trust in the company
Response to the security breach
o 25.10.2010 Security Breach
       “Dear sirs if you see your own name on the list maybe it's time for
        switching ISP (in case you have any option) :D”
o Disclosed and responded the same day (quickly!!)


o User names  recreated
  Passwords  changed


o No personal information was lost
o Clients did not suffer any losses
Response to the security breach

o Internet Solutions network  own IPC network
o Repels 5000 attacks a day!
o Added security measure  reset the passwords
o Investigation together with Internet Solutions



             Acceptable response?           Yes


                      Saved trust?           No
To-do list for the future


o Digital certificates
o Intrusion detection system
o MIS audit
o Regular and thorough testing
o Improved identity management
Thank you!

Weitere ähnliche Inhalte

Was ist angesagt?

Telenor presentation ...Adi...
Telenor presentation ...Adi...Telenor presentation ...Adi...
Telenor presentation ...Adi...
adil bhatti
 
Ubaid ur rehman final internship report on NBP HR department
Ubaid ur rehman final internship report on NBP HR departmentUbaid ur rehman final internship report on NBP HR department
Ubaid ur rehman final internship report on NBP HR department
AL Rehman
 
Effect of Mobile Banking on Customer Satisfaction in Selected Banks in Trans-...
Effect of Mobile Banking on Customer Satisfaction in Selected Banks in Trans-...Effect of Mobile Banking on Customer Satisfaction in Selected Banks in Trans-...
Effect of Mobile Banking on Customer Satisfaction in Selected Banks in Trans-...
paperpublications3
 
Organizational Structure
Organizational StructureOrganizational Structure
Organizational Structure
Sampath
 
Introduction to csr
Introduction to csrIntroduction to csr
Introduction to csr
Viren Patel
 
Application of the Strategic Management Theories in Uber Bangladesh
Application of the Strategic Management Theories in Uber BangladeshApplication of the Strategic Management Theories in Uber Bangladesh
Application of the Strategic Management Theories in Uber Bangladesh
Pantho Sarker
 

Was ist angesagt? (20)

Telenor presentation ...Adi...
Telenor presentation ...Adi...Telenor presentation ...Adi...
Telenor presentation ...Adi...
 
Easy paisa; case study
Easy paisa; case studyEasy paisa; case study
Easy paisa; case study
 
Sample Report On Operation Management in Business By Global Assignment Help
Sample Report On Operation Management in Business By Global Assignment HelpSample Report On Operation Management in Business By Global Assignment Help
Sample Report On Operation Management in Business By Global Assignment Help
 
Mas (2)
Mas (2)Mas (2)
Mas (2)
 
Outsourcing (1)
Outsourcing (1)Outsourcing (1)
Outsourcing (1)
 
Uber bangladesh
Uber bangladeshUber bangladesh
Uber bangladesh
 
Ubaid ur rehman final internship report on NBP HR department
Ubaid ur rehman final internship report on NBP HR departmentUbaid ur rehman final internship report on NBP HR department
Ubaid ur rehman final internship report on NBP HR department
 
Daraz.pk (Business Model)
Daraz.pk (Business Model)Daraz.pk (Business Model)
Daraz.pk (Business Model)
 
Business Model Canvas of daraz.pk
Business Model Canvas of daraz.pkBusiness Model Canvas of daraz.pk
Business Model Canvas of daraz.pk
 
Compensation Strategy: Starbucks’ vs. McDonald’s
Compensation Strategy: Starbucks’ vs. McDonald’sCompensation Strategy: Starbucks’ vs. McDonald’s
Compensation Strategy: Starbucks’ vs. McDonald’s
 
Effect of Mobile Banking on Customer Satisfaction in Selected Banks in Trans-...
Effect of Mobile Banking on Customer Satisfaction in Selected Banks in Trans-...Effect of Mobile Banking on Customer Satisfaction in Selected Banks in Trans-...
Effect of Mobile Banking on Customer Satisfaction in Selected Banks in Trans-...
 
Finance club
Finance clubFinance club
Finance club
 
questions related to E-Commerce
questions related to E-Commercequestions related to E-Commerce
questions related to E-Commerce
 
Organizational Structure
Organizational StructureOrganizational Structure
Organizational Structure
 
Recruitment & selection by coca cola co.
Recruitment & selection by coca cola co.Recruitment & selection by coca cola co.
Recruitment & selection by coca cola co.
 
OLA cabs market Analysis and Trends
OLA cabs market Analysis and TrendsOLA cabs market Analysis and Trends
OLA cabs market Analysis and Trends
 
Introduction to csr
Introduction to csrIntroduction to csr
Introduction to csr
 
An Internship Report Presentationof NIC Asia Bank.pptx
An Internship Report Presentationof NIC Asia Bank.pptxAn Internship Report Presentationof NIC Asia Bank.pptx
An Internship Report Presentationof NIC Asia Bank.pptx
 
Application of the Strategic Management Theories in Uber Bangladesh
Application of the Strategic Management Theories in Uber BangladeshApplication of the Strategic Management Theories in Uber Bangladesh
Application of the Strategic Management Theories in Uber Bangladesh
 
Strategic analysis on square pharma
Strategic analysis on square pharmaStrategic analysis on square pharma
Strategic analysis on square pharma
 

Andere mochten auch

WiFi HotSpot Marketin
WiFi HotSpot MarketinWiFi HotSpot Marketin
WiFi HotSpot Marketin
Kody Smith
 

Andere mochten auch (18)

MWEB - Trends Report 2014
MWEB - Trends Report 2014 MWEB - Trends Report 2014
MWEB - Trends Report 2014
 
Soundbuzz’s Music Strategy for Asia-Pacific
Soundbuzz’s Music Strategy for Asia-Pacific Soundbuzz’s Music Strategy for Asia-Pacific
Soundbuzz’s Music Strategy for Asia-Pacific
 
Apache
ApacheApache
Apache
 
Chapter 8 management information system 12th edition 2012 laudon
Chapter 8 management information system 12th edition 2012 laudonChapter 8 management information system 12th edition 2012 laudon
Chapter 8 management information system 12th edition 2012 laudon
 
WoW Project - World of Wifi
WoW Project - World of WifiWoW Project - World of Wifi
WoW Project - World of Wifi
 
KeyWifi business presentation
KeyWifi business presentationKeyWifi business presentation
KeyWifi business presentation
 
Apa Itu WiFi
Apa Itu WiFiApa Itu WiFi
Apa Itu WiFi
 
New Ways to Generate Revenues from Public Wi-Fi
New Ways to Generate Revenues from Public Wi-FiNew Ways to Generate Revenues from Public Wi-Fi
New Ways to Generate Revenues from Public Wi-Fi
 
WiFi HotSpot Marketin
WiFi HotSpot MarketinWiFi HotSpot Marketin
WiFi HotSpot Marketin
 
Monetizing WiFi
Monetizing WiFiMonetizing WiFi
Monetizing WiFi
 
WiFi: Current And Future Opportunities
WiFi: Current And Future Opportunities WiFi: Current And Future Opportunities
WiFi: Current And Future Opportunities
 
Go to Market Strategy
Go to Market StrategyGo to Market Strategy
Go to Market Strategy
 
Go-to-Market Strategy vs Marketing Strategy
Go-to-Market Strategy vs Marketing StrategyGo-to-Market Strategy vs Marketing Strategy
Go-to-Market Strategy vs Marketing Strategy
 
Web 2.0 youtube
Web 2.0 youtubeWeb 2.0 youtube
Web 2.0 youtube
 
Go-to-Market Best Practices for Startups
Go-to-Market Best Practices for StartupsGo-to-Market Best Practices for Startups
Go-to-Market Best Practices for Startups
 
Go-To-Market Strategy - Entrepreneurship 101 (2012/2013)
Go-To-Market Strategy - Entrepreneurship 101 (2012/2013)Go-To-Market Strategy - Entrepreneurship 101 (2012/2013)
Go-To-Market Strategy - Entrepreneurship 101 (2012/2013)
 
Go to market planning
Go to market planningGo to market planning
Go to market planning
 
Go to-market strategy for B2B SaaS companies
Go to-market strategy for B2B SaaS companiesGo to-market strategy for B2B SaaS companies
Go to-market strategy for B2B SaaS companies
 

Ähnlich wie MWEB Business: Hacked

Security in the News
Security in the NewsSecurity in the News
Security in the News
James Sutter
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
Meg Weber
 

Ähnlich wie MWEB Business: Hacked (20)

IT Security: What an In-Plant Print Center Needs to Know
IT Security: What an In-Plant Print Center Needs to KnowIT Security: What an In-Plant Print Center Needs to Know
IT Security: What an In-Plant Print Center Needs to Know
 
Security in the News
Security in the NewsSecurity in the News
Security in the News
 
Crush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access ManagementCrush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access Management
 
CyberSecurity Update Slides
CyberSecurity Update SlidesCyberSecurity Update Slides
CyberSecurity Update Slides
 
Cybersecurity update 12
Cybersecurity update 12Cybersecurity update 12
Cybersecurity update 12
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
 
Network Security
Network SecurityNetwork Security
Network Security
 
Protecting Your Business - All Covered Security Services
Protecting Your Business - All Covered Security ServicesProtecting Your Business - All Covered Security Services
Protecting Your Business - All Covered Security Services
 
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob DavisLuncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
 
Cyber Security and the Impact on your Business
Cyber Security and the Impact on your BusinessCyber Security and the Impact on your Business
Cyber Security and the Impact on your Business
 
Iron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyIron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data Responsibly
 
Community IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best Practices
 
Data Breach Detection: Are you ready for GDPR?
Data Breach Detection: Are you ready for GDPR?Data Breach Detection: Are you ready for GDPR?
Data Breach Detection: Are you ready for GDPR?
 
Security 101 for No- techies
Security 101 for No- techiesSecurity 101 for No- techies
Security 101 for No- techies
 
Oath appsec sf 2015 dem rev. 2
Oath appsec sf 2015 dem rev. 2Oath appsec sf 2015 dem rev. 2
Oath appsec sf 2015 dem rev. 2
 
Strong Authentication - Open Source
Strong Authentication - Open SourceStrong Authentication - Open Source
Strong Authentication - Open Source
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
 
New Horizons SCYBER Presentation
New Horizons SCYBER PresentationNew Horizons SCYBER Presentation
New Horizons SCYBER Presentation
 
AMER Introduction to ThousandEyes Webinar
AMER Introduction to ThousandEyes WebinarAMER Introduction to ThousandEyes Webinar
AMER Introduction to ThousandEyes Webinar
 
Office 365 in today's digital threats landscape: attacks & remedies from a ha...
Office 365 in today's digital threats landscape: attacks & remedies from a ha...Office 365 in today's digital threats landscape: attacks & remedies from a ha...
Office 365 in today's digital threats landscape: attacks & remedies from a ha...
 

Mehr von Birte Gröger

Mehr von Birte Gröger (6)

Knowing the Drill: Virtual Teamwork at BP
Knowing the Drill: Virtual Teamwork at BPKnowing the Drill: Virtual Teamwork at BP
Knowing the Drill: Virtual Teamwork at BP
 
Nordea goes green with IT
Nordea goes green with ITNordea goes green with IT
Nordea goes green with IT
 
New Service Design Excercise - Experience Hub
New Service Design Excercise - Experience HubNew Service Design Excercise - Experience Hub
New Service Design Excercise - Experience Hub
 
Progressive: Pay-as-you-go insurance
Progressive: Pay-as-you-go insuranceProgressive: Pay-as-you-go insurance
Progressive: Pay-as-you-go insurance
 
How do fear appeals in advertising work?
How do fear appeals in advertising work?How do fear appeals in advertising work?
How do fear appeals in advertising work?
 
Teaching Bayesian Method
Teaching Bayesian MethodTeaching Bayesian Method
Teaching Bayesian Method
 

Kürzlich hochgeladen

Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
ZurliaSoop
 

Kürzlich hochgeladen (20)

Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
Nanded Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Nanded Call Girl Just Call 8084732287 Top Class Call Girl Service AvailableNanded Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Nanded Call Girl Just Call 8084732287 Top Class Call Girl Service Available
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
Buy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail AccountsBuy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail Accounts
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
Pre Engineered Building Manufacturers Hyderabad.pptx
Pre Engineered  Building Manufacturers Hyderabad.pptxPre Engineered  Building Manufacturers Hyderabad.pptx
Pre Engineered Building Manufacturers Hyderabad.pptx
 
KALYANI 💋 Call Girl 9827461493 Call Girls in Escort service book now
KALYANI 💋 Call Girl 9827461493 Call Girls in  Escort service book nowKALYANI 💋 Call Girl 9827461493 Call Girls in  Escort service book now
KALYANI 💋 Call Girl 9827461493 Call Girls in Escort service book now
 
Cannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 Updated
 
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
 
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
 
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
PARK STREET 💋 Call Girl 9827461493 Call Girls in Escort service book now
PARK STREET 💋 Call Girl 9827461493 Call Girls in  Escort service book nowPARK STREET 💋 Call Girl 9827461493 Call Girls in  Escort service book now
PARK STREET 💋 Call Girl 9827461493 Call Girls in Escort service book now
 
WheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond InsightsWheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond Insights
 
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service AvailableNashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All TimeCall 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Cuttack Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Cuttack Call Girl Just Call 8084732287 Top Class Call Girl Service AvailableCuttack Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Cuttack Call Girl Just Call 8084732287 Top Class Call Girl Service Available
 

MWEB Business: Hacked

  • 1. MWEB Business: Hacked Management Information Systems 10.12.2012
  • 2. Outline 1. What technology issues led to the security breach at MWEB? 2. What is the possible business impact of this security breach for both MWEB and its customers? 3. If you were an MWEB customer, would you consider MWEB's response to the security breach to be acceptable? 4. What should MWEB do in the future to avoid similar incidents?
  • 3. o South Africa’s 2nd largest Internet Service Provider o Founded in 1997 o Divisions: MWEB Connect and MWEB Business o Customer base: • Home users • Small, medium and large enterprises • Corporate clients
  • 4. Portfolio o Tailored Business Solutions o Personalized account management o Own world class network infrastructure o International connectivity redundancy o Next generation data centers o 24/7 Technical support
  • 5. Security Measures o Using AVG Internet Security as partner o Identity protection o LinkScanner (safe surfing) o WebShield (safe social networking) o Antiphishing, Antispam, Antivirus, Antispyware o Enhanced firewall o Automatic e-mail cleaning o Blocking network ports commonly used by hackers
  • 6. Dangerous Breach Issue: oCompromised subscribers account details oPublished logon and password details Reason oHackers gained access to Web based Internet Solutions’ self-service management system o outsourced, not in total control
  • 8. Business Impact o Notifying customers and find solution o Determine reason for breach = interruption of business processes o Work together with IS o Lost trust of customers  gain back o Implement proper policies and controls o Prepare for legal, financial risks o Threat to customer retention and reputation Very tricky process with intangible and tangible costs
  • 9. Customer Impact o Need for explanation o Need for behavioral recommendations o Loss of personal information (privacy) o Data lost or inaccurate o Additional compromising of related accounts o Inconvenience: have to change password or could not access the service o Lost trust in the company
  • 10. Response to the security breach o 25.10.2010 Security Breach “Dear sirs if you see your own name on the list maybe it's time for switching ISP (in case you have any option) :D” o Disclosed and responded the same day (quickly!!) o User names  recreated Passwords  changed o No personal information was lost o Clients did not suffer any losses
  • 11. Response to the security breach o Internet Solutions network  own IPC network o Repels 5000 attacks a day! o Added security measure  reset the passwords o Investigation together with Internet Solutions Acceptable response? Yes Saved trust? No
  • 12. To-do list for the future o Digital certificates o Intrusion detection system o MIS audit o Regular and thorough testing o Improved identity management

Hinweis der Redaktion

  1. Cater for specific connectivity requirements
  2. (Wired and wireless Internet connectivity, hosting services, applications, VoIP)
  3. Automatic e-mail cleaning from recognized malware sources  protection against junkmail and viruses
  4. 2390 users of digital subscriber line were affected MWEB uses this system to manage accounts not yet migrated to MWEB network Legacy system, not so security options
  5. Bulk was already migrated but some business users still on the old system
  6. Quotation is from the site where the information was published
  7. Thank you for listening. Any questions?