It was reported by the Wall Street Journal on January 24 that The Coca-Cola Company (NYSE:KO)’s company laptops were stolen from its Atlanta headquarters, compromising the personal information of up to 74,000 people. The data on the laptops was not encrypted and included names, Social Security numbers and addresses.
Coca-Cola’s laptop thief
According to The Coca-Cola Company (NYSE:KO) spokesperson Ann Moore, a former employee stole the laptops. The company learned of the data breach on December 10, 2013, but waited to inform employees of the situation until January 24.
ADW Capital’s 2020 letter: Long CDON, the future Amazon of the Nordics
ADW Capital Partners was up 119.2% for 2020, compared to a 13.77% gain for the S&P 500, an 11.17% increase for the Russell 2000, and an 8.62% return for the Russell 2000 Value Index. The fund reports an annualized return of 24.63% since its inception in 2005. Q4 2020 hedge fund letters, conferences and more Read More
Following in the wake of Target Corporation (NYSE:TGT)’s massive holiday data breach, this is yet another instance of personal information being stolen on a massive scale due to poor data security policies.
Tony Busseri provides security solutions
Tony Busseri, CEO of Route1 Inc. (CVE:ROI) (OTCMKTS:ROIUF), a Security and ID management company that provides solutions for secure, remote access to the US Department of Defense and the US Department of Homeland Security, as well as certain divisions of the Canadian Government and private sector businesses, is an expert on data security and remote access. He strongly advocates a security methodology that ensures data never the leave the safe confines of the enterprise firewall. The root cause for most breaches is from lost/stolen laptops, USB memory sticks, or “hacked into” mobile devices used for remote access. Human error is a fact of life, and is why policy alone is not enough to protect any organization. Again, why are technologies not put in place?
Mr. Busseri can provide you expert commentary on the current status of common cybersecurity protocols for major Enterprises, the technology used, and how breaches can easily and cost effectively be prevented by implementing the right technology that factors in multi-factor identification and does not allow sensitive data to leave the secure network. Mr. Busseri can also speak specifically to current cybersecurity policies, and the need for specific changes.