Attacker compromises information of 250K in Bailey’s data breach

This article details a reported breach of the e-commerce site,  The scariest part – it began in 2011 and has proceeded unnoticed until now.  This is a perfect example of why auditing is necessary, why logging and log review is necessary, and frankly why IT security in general is necessary.  I am not saying any of these controls or methodologies would have stopped the breach, but I would like to think that it would have been discovered long before now.


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s