S3 EP 03 Retail Under Attack: Lessons from the Largest Data Breach in History
Manage episode 484167631 series 3472133
One Step Secure IT provides a range of specialized services including Cybersecurity, Managed/Co-Managed IT, Information Security, and Compliance, that enable businesses across the country to leverage technology as a competitive advantage and prioritize business growth. Contact us today: https://www.onestepsecureit.com/beyond-cyber-contact#beyond-cyber-contact-form
Episode Chapters:
00:00 Episode outline
00:26 Welcome Episode
00:50 Unpacking Hot Topic Cyber breach. What happened with this breach. What do we know about the breach so far?
04:27 This breach exposed highly sensitive data, including partial credit card details and loyalty points, which hackers could exploit for identity theft, financial fraud, and account takeovers. How these types of stolen data specifically pose risks—not just for customers, but also for retailers?
06:02 Hot Topic, Torrid, and Box Lunch are all larger businesses, but we tend to speak to more of the SMB entrepreneur is something like this still relevant to those size businesses?
08:49 How to minimize the risk (compliance and policies), the impact (incident response plan), and the reputational damage?
16:36 What exactly does double extortion entail, and should businesses be concerned about even more risks in these types of attacks?
21:58 Final Thoughts and Closing
Podcast Video One Step Secure IT - YouTube
Learn about our services https://www.onestepsecureit.com/
Host by:
Scott Kreisberg - CEO & Founder of One Step
Produced by Genesis Aquino
Music Production by Michael Stevens
----
LinkedIn:
https://www.linkedin.com/company/onestepsecureit/mycompany/
Facebook:
https://www.facebook.com/OneStepSecureIT
Twitter:
https://twitter.com/onestepsecureit
Chapters
1. Episode outline (00:00:00)
2. Welcome Episode (00:00:26)
3. Unpacking Hot Topic Cyber breach. What happened with this breach. What do we know about the breach so far? (00:00:50)
4. How these types of stolen data specifically pose risks—not just for customers, but also for retailers? (00:04:27)
5. Hot Topic, Torrid, and Box Lunch are all larger businesses, but we tend to speak to more of the SMB entrepreneur is something like this still relevant to those size businesses? (00:06:02)
6. How to minimize the risk (compliance and policies), the impact (incident response plan), and the reputational damage? (00:08:49)
7. What exactly does double extortion entail, and should businesses be concerned about even more risks in these types of attacks? (00:16:36)
8. Final Thoughts and Closing (00:21:58)
20 episodes