Expert comments on JP Morgan breach highlighting cybersecurity risks - Global Banking & Finance Review
This image features expert comments regarding the recent JP Morgan breach. Insights from Rapid7, NTT Com Security, and Centrify emphasize the importance of vigilance against phishing and social engineering attacks following high-profile data breaches.
Top Stories

JP MORGAN BREACH – COMMENT FROM RAPID7, NTT COM SECURITY, AND CENTRIFY

Published by Gbaf News

Posted on October 4, 2014

2 min read
Add as preferred source on Google

Rapid7 Insights on JP Morgan Breach

Comment from Tod Beardsley, engineering manager, Rapid7

“Unfortunately we may still see piggyback attacks where cybercriminals launch social engineering attacks to cash in on the customer anxiety that follows the news cycle surrounding reports of any big-name breach. The usual advice applies: If you get an e-mail or a call from a JP Morgan rep, feel free to thank them for contacting you and hang up. Customers should always initiate that contact by looking at their credit card or statement for the contact number; you simply can’t trust that an incoming call or e-mail is legitimate and not a phishing attempt.”

NTT Com Security Perspective on Detection Time

Comment from Garry Sidaway, Global Director of Security Strategy, NTT Com Security
“The good news on this story is the fact that the time to detect the breach is significantly shorter than the average. But it does still indicate the huge challenges every business has against the increasingly complex threat landscape. My concern now is making sure that the lessons are learned and that information security and risk management are embedded into the business to protect personal data. Also as we have seen through the Global Threat Intelligence report, how they manage the incident is also critical”.

Centrify's Analysis of Data Loss Risks

Comment from Barry Scott, CTO, Centrify

Impact Beyond Usernames and Passwords

“It’s not always losing a username and password that’s directly the problem, although that’s very serious. Loss of data such as names, e-mail addresses, home addresses and phone numbers are all part of the jigsaw that make up a person’s digital presence, and can form a good basis for further targeted attacks on that individual and the other services they use. How many people will be getting phishing phone calls as a result of their phone number being lost in this breach, with the caller using other information to try and prove that they are genuine?”

Key Takeaways

  • Cybercriminals may exploit customer anxiety post‑breach via phishing or calls.
  • Rapid7 praises quicker breach detection but stresses embedding security across operations.
  • Centrify warns that exposed contact info facilitates highly targeted phishing attacks.

References

Frequently Asked Questions

What should customers do if contacted by someone claiming to be from JPMorgan?
Don’t trust unsolicited calls or emails—initiate contact using official numbers from your statements or card.
What is Rapid7’s main concern following the breach?
That cybercriminals will launch phishing campaigns exploiting customer anxiety and trust in the news cycle.
What does NTT Com Security emphasize in its comment?
That faster detection is positive, but firms must embed information security and risk management into their business operations.
Why does Centrify highlight loss of non‑credential data as significant?
Because names, emails, home addresses, and phone numbers can help craft highly targeted phishing attempts across services.

Tags

Related Articles

More from Top Stories

Explore more articles in the Top Stories category