On 29.08.2016 the DCCC – House Democrats’ campaign arm – confirmed the breach, which was first reported by Reuters
“Based on the information we have to date, we’ve been advised by investigators that this is similar to other recent incidents,” namely, the prior infiltration of the Democratic National Committee’s email system.
This last attack follows two other hacks on the Democratic National Committee, or DNC, and the party’s fundraising committee for candidates for the U.S. House of Representatives.
“It can happen to anyone even at a cybersecurity expert ” says In an interview to the ‘La Stampa’ Scott Schober, CEO of Berkeley Varitronics Systems, and explains:” There are a couple of things you should do and which in this case were not made.
First, create strong passwords, and secondly to pay attention to ‘fishing’, ie the technique whereby you send an email to the bait with which we enter into the personal data of a person or a system.”
“The FBI takes seriously any allegations of intrusions, and we will continue to hold accountable those who pose a threat in cyberspace,” the agency said in an emailed statement.
The Cyber Security is now, more than before, in the limelight! Thanks to all these news about hacker attack, also to government systems, all companies are putting more and more attention about security of their IT Infrastructures.
“Cyber threats certainly cannot be faced by giving up the potentials offered by the IT systems and their interconnection within the network, thus loosing the increase of productivity and efficiency linked with computerization. The answer should be systematic, aimed at raising the citizens’ awareness, the “duty of care” of companies and the International “due diligence” of the country about the cyber threat.”
Ref. Cyber Security Report – A National Cyber Security Framework
At arimas we are always careful and eager to learn about our customers needs so we decide to start to offer CYBER SECURITY AUDIT.
Using our knowledge and expertise, maturated side by side with our recent partner, we are now proud to offer:
- Real Life Attack Scenarios
- Custom Scenario
- Rapid Deployment
- Instant Results
- Online Real-Time Dashboard
- Automated Prescheduled Reports