Connecting to LinkedIn...

W1siziisijiwmtuvmdqvmtuvmdgvntqvmzgvnzi1l01ptlrbu0hfqkxpr19vtljftkrfukvex0lnqudfx3jlc2l6zwrfyw5kx3jlbmrlcmvklmpwzyjdlfsiccisinrodw1iiiwimtkymhgxmjuwiyjdxq

Blog

Sage cloud computing systems breached

17/08/2016 by Usha Tyagi

W1siziisijiwmtyvmdgvmtcvmtavmjqvmzavmjy1l1nly3vyaxr5igjyzwfjac5qcgcixsxbinailcj0ahvtyiisijywmhg0mdbcdtawm2uixv0

Sage, one of the world leaders in cloud computing systems, has admitted that its cyber security was breached and 280 companies have been affected as a result. Releasing an official statement on the matter, the British firm said that an internal login had resulted in unauthorised access. This has led to the personal details of employees being leaked, though further information was withheld.

The company said: “We believe there has been some unauthorised access using an internal login to the data of a small number of our UK customers so we are working closely with the authorities to investigate the situation.” The firm added that information of the breach has been given to both the City of London Police and the Information Commissioner’s Office. Sage did not, however, provide any further information on the breach, such as how many people’s details may have been stolen, the services that were cracked, or just how the data was taken.

For those worried about cloud computing security, the latest incident is likely to raise concerns. Sage’s statement puts the monitoring quality of its own authentication mechanisms into question, as well as whether login credentials were compromised or it was an employee, current or former, who facilitated the breach. 

There are some 6 million small and medium-sized enterprises using Sage’s human resources and accounting software. The unauthorised access of just 280 accounts is, therefore, a small drop in the pond but still indicates the potential for breaches to occur. It’s also claimed that only UK-based customers have been affected.

Digital Guardian Global Security Advocate and Threat Researcher Thomas Fischer explained that Sage’s security has been proven to be inadequate. “It appears the Sage breach came from an insider,” he said. “Insider threats are almost always preventable if the right people management processes and tools are in place.” Fischer continued by saying: “This is the case even if the employee is a so-called reluctant insider, meaning that, for example, an external party has compromised their account. Sage also claims that it is currently unsure how the data was compromised. Again, with the proper investments in IT security, this should be easily controllable and identifiable within a very short period of time.”

The news follows reports that Oracle also suffered a serious breach. This breach appears to have stemmed from Russian hackers using malicious code within the company’s legacy retail systems solutions. 

 

About Us

Montash is a multi-award winning global technology recruitment business. Specialising in permanent and contract positions across mid-senior appointments across a wide range of industry sectors and IT functions, including:

ERP Recruitment, BI & Data Recruitment, Information Security Recruitment, Enterprise Architecture & Strategy Recruitment , Energy Technology Recruitment, Demand IT and Business Engagement Recruitment, Digital and E-commerce Recruitment, Leadership Talent, Infrastructure and Service Delivery Recruitment, Project and Programme Delivery Recruitment.

Montash is headquartered in Old Street, London, in the heart of the technology hub. Montash has completed assignments in over 30 countries and has appointed technical professionals from board level to senior and mid management in permanent and contract roles.

comments powered by Disqus

Social Stream

Latest News

W1siziisijiwmtcvmdkvmjevmdgvndmvmduvmtmxl1vudgl0bgvkigrlc2lnbiaomjmplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Why do we punish the victims of hacking?

2017-09-21 09:00:00 +0100

Hacks occur every 39 seconds, with 95% of them targeting governments, retailers and the tech industry. If the hackers are caught, they'll face prison time under the Computer Misuse Act. More often than not, the businesses who are victims of those attacks expose themselves to punishment of their own. The laws that determine the duty of protection owed to businesses and their customers is both vague and broad, making them question just how much protection...

W1siziisijiwmtcvmdkvmtgvmtavmtivndyvodeyl1dvbwvuigluihrly2ggkdiplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Tech is for girls... and always has been!

2017-09-18 10:00:00 +0100

Today, it's hard to deny that the IT and tech industry is a male-dominated field. Women earn only 28%[1] of computer science degrees, while the quit rate for women in the high tech industry is 41%[2], twice as high as it is for men. These two statistics would suggest that perhaps women aren't just discouraged from entering the tech field, but may find it a challenging environment to work in both in terms of treatment and pay. Facebook chief operating of...