Remember meForgot password?
    Log in with Twitter

article imageLedger suffers data breach, personal data leaked Special

By Tim Sandle     Aug 6, 2020 in Technology
France-based major hardware wallet provider Ledger has admitted it suffered a data breach on June 17 that appears to have allowed a “third party” access to at least 1 million of its users’ contact details. What does this say about online security?
In response to the incident, Ledger took to Twitter to state that its marketing and e-commerce database was compromised through a third party’s API key that was misconfigured on their website. This set-up error led to the website exposing its customers’ contact details and order information.
Whilst reporting on the exposed data, Ledger has claimed that there was no spill of cryptocurrency holdings or client transaction information.
Looking into the issue for Digital Journal is Chris DeRamus, who is the VP of Technology, Cloud Security Practice, Rapid7.
DeRamus begins by explaining my this particular data loss is so significant, and this comes down to what the website was trading in. DeRamus says: “Cryptocurrency is an incredibly sensitive industry when it comes to data breaches. Although Ledger has reported that payment info, passwords, and cryptocurrency funds were not affected, it will affect customer trust knowing their personal data was left unprotected. It is crucial to ensure that all sensitive information - from email addresses to cryptocurrency funds - is secure and kept out of the hands of threat actors."
In terms of ensuring that these types of data losses do not happen again, DeRamus recommends new security protocols. According to DeRamus: "To ensure that a company database is secured, businesses should have Identity Access Management (IAM) governance in place."
IAG is process that allows organizations to monitor and ensure that identities and security rights are correct, as well as managed effectively and securely.
In addition, he is of the view that: "Businesses should follow the principle of least-privileged access when provisioning IAM permissions by providing checks to restrict identities from being able to access beyond their systems. "
DeRamus explains further that "This is possible by implementing automated security tools that continually protect systems and servers from IAM vulnerabilities, as well as misconfigurations, policy violations, and other threats to ensure total security and compliance.”
More about Ledger, Personal data, data leak, Data loss
Latest News
Top News