Business Analyst Digital Transformation News

Driving Digital Transformation Amidst COVID-19 Pandemic

Driving digital transformation amidst the COVID-19 pandemic has caused dramatic changes in operations and communications.

The COVID-19 Diaries

2020 has been a year of surprises. The globe was not prepared to face its crisis. Lockdowns were implemented around the world. Employees can no longer go to offices. Students can no longer study at schools. Businesses can no longer cater to on-premise services.

The COVID-19 pandemic erupted and businesses crawl through continuity. Even today, we still face uncertainties. Nobody fully knows when we are fully getting back to normal. People now resort to ‘new normal’ living. 

Certainly, it has been a year of massive change.

The Need For Digital Transformation During The Pandemic

The world relies on technology more than ever. Communication with family and friends are now through video conferencing. The same is true with businesses.

Businesses have seen the need to speed up their digital transformation. Because digital initiatives can make businesses run even without the human workforce. Moreover, the use of digital transformation tools fosters productivity. Employees can now work remotely with cloud-based platforms. 

Driving Digital Transformation Amidst The Pandemic

Consider the following impacts the pandemic brought to digital transformation.

Communication with Customers

Before, businesses attract customers with banners and in-house discounts. But during the pandemic, personal customer engagement changed. So businesses should accelerate their marketing strategies.

During the pandemic, customers spend most of their time online. This opened wide doors of opportunity for digital marketing. Developing websites and social media commerce have made marketing still thrive. 

With digital marketing, customers can easily access shops. Also, more brand awareness is possible with ads and social media. In addition, customers can now easily send feedbacks and reviews. As a result, this opened more ways for businesses to understand their market.

Concern For Security

However, with the rise of technology dependence. Also comes the increase in threats and cyber risks. During the pandemic, more cyberattacks have been reported. Not to mention that even big platforms have been affected. 

Now, there rises a need to digitally transform security. For example, employees working in a remote setting. This work from home setup has been an advantage for cybercriminals. Because employees mostly use personal devices and connections. Even when accessing corporate data and tasks. 

Communication Between Employees

Employee communication has also changed. Before, meetings and conferences are held in halls and rooms. But today, the new normal is to hold meetings in a room- in a virtual conference room.

Cloud-based communication platforms like Zoom, Google Meet, and Microsoft Teams. These are mostly in use for employee communication and webinars. In fact, webinar attendance has increased up to 21% during the pandemic.

Office Policies For The New Normal

The new normal has still opened ways for businesses to operate. However, with new policies and regulations. For example, companies develop new rules for working. As mentioned above, meetings are now done virtually. 

In addition, this affects their working days, and working routine. As a result, employees should now adapt to the digital era because of the pandemic. 

Cybersecurity News

Houzz Data Breach – What Really Happened?

The Houzz data breach happened in December 2018. The home improvement start-up firm claims it has over 40 million users. Let’s find more about the Houzz data breach in this article. 

Another day, another breach. This may sound old but yes, another data breach occurred. Cyberattacks get even more common each day. It is so common that “if” is no longer the question to ask. It’s a matter of “when”. Every sector experiences it – from government agencies to small businesses with unsecured databases.

In December 2018, another popular company got victimized again – Houzz. The mentioned company serves in the home improvement industry. 

What is Houzz?

This company is a website and an online community. It offers home improvement services to homeowners. Moreover, they cater services to home design aficionados and professionals. One of its tools is the marketplace. The marketplace enables home improvement companies to advertise and sell their products. The company claims it has over 40 million users.

Houzz Data Breach

The company admitted they suffered a data breach. Their announcement stated that unauthorized third-parties accessed files. Those files contain public visible user data. Yet, it is still unclear if hackers accessed the files through a hacked system. Houzz still didn’t say either if a rogue employee started the breach or a database was left unsecured.

Furthermore, the information involved in the breach includes:

  • IP address
  • User logs in Facebook
  • Email addresses
  • User IDs
  • Public information from a Houzz profile (for instance, name and address)
  • City and ZIP code derived from the IP address

Moreover, the company didn’t reveal whether hackers distributed the data or sold on any hacking forums. Fortunately, no payment information or SSNs were involved in the attack. Moreover, the company said that the actual user passwords were not compromised. Instead, hackers had access to scrambled passwords.

Response On Houzz Data Breach

While hackers didn’t have access to actual passwords, the company recommended its users to change their passwords. The company enables users to do this by visiting the “Change Password” page of their website or going to their account settings.

Furthermore, the company sent email notifications to its users about the breach. The home improvement firm promised its users to improve data security. Moreover, they wrote that they started an internal investigation and engaged with law enforcement. Additionally, they retained a leading security forensics firm regarding the matter. 

Yet, it’s not clear if the company will face penalties.

Users affected by the Houzz data breach should immediately change their passwords. Moreover, consider using a password manager in the future.

Precautionary Steps

As we have mentioned earlier, the company experiencing a data breach is inevitable. Here are some suggestions:

  • Beware of phishing scams – this is one of the most common methods hackers use. Hackers use this method hoping to get victims to click on malicious links. 
  • Install strong security software – it is important to protect your gadgets with strong security software. Keep your antivirus updated. This serves as the best defense.
  • Never reuse the same password for multiple online services.
  • Enable two-factor authentication.
  • Frequently check your bank accounts for suspicious activity. 
  • Close accounts that you rarely use.
Cybersecurity News

Everything About National Cybersecurity Authority

King Salman of Saudi Arabia set up the National Cybersecurity Authority on October 31, 2017. In this article, we will refer to it as NCA. It aims to enhance Saudi Arabia’s cybersecurity. That includes protecting information technology networks, systems, and data. Besides, another goal of NCA is to improve online security for companies and individuals.


King Salman bin Abdul Aziz Al Saud issued a decree to form the NCA on October 31, 2017. Furthermore, Crown Prince Muhammad bin Salman heavily supported the decree. They are ministers responsible for the NCA. 

The king appointed Dr. Musaed bin Mohammed Al-Abain as chairman of NCA. Dr. Al-Aiban is a Harvard graduate. Moreover, he is a member of the Council of Ministers. Dr. Al-Aiban has been a minister of the state since 1992.

Additionally, these notable members of the state serve in the NCA.

  • President of State Security
  • Chairman of the General Intelligence
  • Deputy Minister of Interior
  • Assistant Minister of Defense

Essential Cybersecurity Controls

The National Cybersecurity Authority created the ECC. It means Essential Cybersecurity Controls. ECC will serve as the mandating entity of the government. 

Hence, public and private sectors are now mandated to develop national security policies. ECC measures constitute the minimum security requirements for in-scope national organizations. In summary, public and private sectors are required to comply with the ECC’s regulations.

Goals and Purpose

The Kingdom recognizes it must take appropriate security measures to improve its digital economy. According to the Saudi Press Agency, “the authority will be linked to the King and is created to boost cybersecurity of the state, protect its vital interests, national security and sensitive infrastructure.”

The National Cybersecurity Authority aims to protect the whole country against cyber threats. It includes the privacy of all state data. Furthermore, NCA aims to protect private and public companies’ data. The protection NCA aims also include all individuals.

Also, the NCA aims to establish a national industry in the field of cybersecurity. One of its top priorities is to attract and hire qualified national cadres. Aside from that, NCA also aims to build partnerships. That includes public and private entities. NCA also targets to stimulate innovation and investment. As a result, it will contribute to achieving technological rebirth. Consequently, it serves the future of the Kingdom’s national economy.

Furthermore, the NCA also gives young Saudis a great opportunity to take part in the national effort to strengthen cybersecurity. That is according to DNJ Technologies chief executive Othman Al-Robaish’s statement to Arab News.


According to Dr. Al-Aiban, the following will be included in the NCA’s protection.

  • Networks
  • IT systems
  • Operating systems
  • Hardware and software components
  • Services and data

Furthermore, he emphasized that the NCA will take into account the increasingly vital importance of cybersecurity in the lives of the public.


Naif Al-Rashid, a Saudi journalist in Riyadh, said strengthening cybersecurity would increase the confidence of Internet users, not only individuals but also government entities, security facilities, financial houses, foreign investors, and others who transacted business online.

Please watch the video below to know more.

Cybersecurity News

The Armor Games Data Breach: A Security Issue

Armor Games data breach. The Armor Games data breach affected millions of people. Well, how did this security issue happen?

What Is A Data Breach?

A data breach is intentional or accidental. It is a release of secure or confidential information to an untrusted setting.

Data breaches may involve financial information. It includes

  • credit card or bank details
  • personal health
  • personal identity
  • business secrets of companies
  • intellectual-property

Most data breaches involve overexposed files. It includes documents and sensitive information. Moreover, data breaches can be quite expensive to businesses.

It will cost remediation, investigation, and so forth. So is the cost of reputational damages. The company also provides cybersecurity to victims of endangered data.

A Glance Of Armor Games

Armor Games is a game portal website. It offers a free online flash game publisher. 

The original developer uploads and maintains each game. Also, some include unlockable player successes. 

In recent years, Armor Games has begun supporting HTML5 titles. Users can chat with the site and create online profiles.

Armor Games is the brand behind famous games such as:

Exposing Armor Games Data Breach

On March 3, Armor Games revealed that they had a data breach in 2019. Reports say that the database sold on the Dream Market.

Dream Market is an online darknet market. It allows online users to browse without noticing them. They are secured and go freely.

This marketplace sold different content. Some are drugs, stolen data, and fake goods. 

It also has forums. Where buyers, vendors, and other members of the community could interact.

On January 29, 2019, a security group informed them about a possible breach of users’ data. They started an investigation. They found out that this breach is real and happened around January 1, 2019.

This breach affects 16 companies. But, Armor Games is holding less than 2% of the total accounts affected. 

Now, there is no proof that there is a misuse of data. They are taking steps to prevent it.

The database affected users’ information. Like:

  • public profiles
  • login data 
  • birthdays of admin accounts
  • information about their password protection processes

Armor Games Data Breach: What Users May Expect And Do?

They tell users to renew their passwords. Hence, using unique, creative passwords. Also, avoid reusing passwords across websites.

Users should change passwords if they are reusing them on other services. It includes other gaming programs.

On their part, they make changes to strengthen security. It also aims to fix any weaknesses found in password protection methods.

They also add measures to protect users from misuse of this information on its site. Armor Games have begun reporting authorities and will support law requirements. 

Hence, users also have the right to request to access or delete their data at any time. The Armor Games sincerely apologize.

They caused inconvenience and worry about this incident. Moreover, Armor Games remains committed to secure the personal information in its care. 

Thus, they will notify users of any improvements. They will continue to work out to be the best place to play free web games online.

Cybersecurity News

What Is CrowdStrike Trump Mentioned to Ukraine’s President?

On 25th September 2019, the White House published a July call transcript between the U.S. President Donald Trump and Ukraine’s President Volodymyr Zelensky. Whereas, Trump mentioned in the call the company ‘CrowdStrike.’ What is the CrowdStrike Trump mentioned in this call?

Trump requested Zelensky to look after the cybersecurity firm CrowdStrike. Additionally, the company investigated the hack on DNC in 2016. In this article, we will get to know more about CrowdStrike. 

History of CrowdStrike

CrowdStrike has three founders, namely:

George Kurtz (CEO)

Dmiti Alperovitch (CTO) 

Gregg Martson (CFO, retired)

These three co-founded the company in 2011. A year after, the company hired Shawn Henry to lead the sister company, CrowdStrike Services. Thus, the latter focused on proactive and incident services.

More About CrowdStrike

This company is based in Sunnyvale, California. Moreover, it is a provider of endpoint protection and threat intelligence. Furthermore, CrowdStrike also offers pre and post response to cyber threats. The company’s mission is: “To Keep the Bad Guys Out of Your Network.” 

The company investigated several high-profile cyberattacks. For example, the 2014 Sony Pictures hack and the 2015-16 attacks on Democratic National Committee. 

CrowdStrike’s Goal

George Kurtz sums up the company goal. He is the president of the company. He explained:

“We are building software to defeat the human mind. They (attackers) are using their cunning and skill to get into every large company on the planet, and we have to build technology that we know they are trying to defeat. Ultimately, we have to stay ahead of them.”

In other words, the company aims for bad actors. Furthermore, they aim for the root, not their malware.

CrowdStrike’s Falcon

The same CrowdStrike Trump mentioned makes an antivirus-like product. CrowdStrke named it Falcon. Furthermore, this is a cloud-based software that protects computers from malware. Falcon is the main product of CrowdStrike. Moreover, Falcon is being sold to big corporations to protect their data. 

Among its notable customers are MIT, Amazon Web Services, and MIT. Also, Falcon provided threat intelligence and attribution to nation-state actors. It also serves various states and cities.

Falcon is a unified set of cloud-delivered technologies that prevent all types of attacks. Moreover, Falcon’s host is a tiny and lightweight sensor. The sensor has enough intelligence to detect threats and prevent those from happening. Additionally, CrowdStrike installs the sensors on every endpoint.

Afterward, the sensors transmit relevant data to CrowdStrike’s Advanced Threat Intelligence Cloud. Also, many personnel analyzes the data.

Solutions That The Falcon Offer

The CrowdStrike Falcon Platform includes:

Falcon Prevent — Next-Generation Antivirus (NGAV)

This has antivirus capabilities that protect the company’s systems from malware. 

Falcon Insight — Endpoint Detection and Response (EDR)

Insight allows companies to have continuous monitoring of their systems. Moreover, it is real-time comprehensive visibility. Insight ensures that nothing is missed. As a result, the chances of breaches getting detected are very high.

Falcon OverWatch — Managed Threat Hunting

Overwatch is a dedicated team that works for you 24/7. 

Falcon Discover — Security Hygiene

Discover offers network security monitoring and IT hygiene by identifying unauthorized endpoints, credentials, and applications in your organization.

In case you are wondering what’s the story behind this CrowdStrike Trump issue, check the video below.

Cybersecurity News

Dominion National Data Breach: The 9-Year Investigation

Dominion National data breach. The Dominion National data breach investigation lasted for Nine years. But, when did the investigation begin?

Today, data hacks in the healthcare area are everywhere. Often, these stories involve tools that may have left files on an exposed server.

Also, employees might click through an email. These actions can endanger data for several months.

How does the Dominion National data breach happen?

An Overview Of Dominion National

The Dominion National is an insurance company. In which it provides a guarantee of coverage. Like detailed loss, damage, sickness, or death in return for payment. 

The insurance company benefits include dental and vision. It has individual members, employer groups, municipalities, and associations. It is also an administrator for health plans.

The Dominion National (Dominion) was formed in 1996. Its headquarter is in Arlington, Virginia. 

It has 840,000 customers. Such as:

  • leading health plans
  • employer groups
  • municipalities
  • associations
  • individuals

When And How Did The Dominion National Data Breach Happen?

The report says that the Dominion National data breach took place on August 25, 2010. They found out about the security incident only in 2019. They also identified the hacker.

The servers may include personal information. Namely, plan producers and participating healthcare providers. 

It involves some personal information that Dominion National maintains. Such as connection with the services it provides. The hackers entered some of its computer servers.

The information ranged by an individual. But it may have include:

  • names
  • addresses
  • email addresses
  • dates of birth
  • Social Security numbers
  • taxpayer-identification numbers
  • bank account
  • routing numbers
  • member ID numbers
  • group numbers
  • subscriber numbers 

These data are sensitive. Gladly, the Dominion National went fast to clean the affected servers. They have no proof of any access to the information, taken, or misused.

On June 21, 2019, the Dominion National began telling the potentially affected individuals. The company will give two years of free account monitoring. It includes fraud protection services to affected members. 

Moreover, Dominion National opened an incident response line. It is open from Monday through Friday, 8:00 a.m. to 8:00 p.m., Eastern Time. 

Also, they implemented enhanced monitoring and alerting software. It will prevent something like this from happening in the future. Dominion National also reported the FBI of the event.

Real Talk About Data Breaches

Truly, nine years is a long time to discover hacking. The time passed may cause many damages. It is a big chance for hackers to move through systems. 

They can insert a backdoor. Also, gather data and spy on communications. 

Even though the data breach source is not clear enough. Yet, the most common ways to hack are emails and browsers. Through this, they can make their way through systems to get to their target. It includes the company’s servers.

Afterward, attackers can disguise and may remain hidden. Strict and layered defenses are helpful.

This application isolation help contains malicious threats. It stops hackers from entering the network. At least, if a user does visit an infected site or open a malicious attachment, then the malware is will be harmless.

In this way, the hacker cannot go anywhere. It cannot steal nor reach company servers.

Cybersecurity News

ShareThis Data Breach Leaked Over 40 Million Accounts

Over 40 million users were affected by the ShareThis data breach. It happened in July 2018.

What information was leaked? Also, how can you protect your data?

Read on to learn more.


Anytime a data breach can happen. In fact, we are almost used to reading news about breaches.

But in July 2018, 16 websites were affected by a single breach. So, it’s time to take these incidents seriously.

According to reports, these are the 16 affected websites:

  1. Dubsmash (162 million)
  2. MyFitnessPal (151 million)
  3. MyHeritage (92 million)
  4. ShareThis (41 million)
  5. HauteLook (28 million)
  6. Animoto (25 million)
  7. EyeEm (22 million)
  8.  8fit (20 million)
  9. Whitepages (18 million)
  10. Fotolog (16 million)
  11. 500px (15 million)
  12. Armor Games (11 million)
  13. BookMate (8 million)
  14. CoffeeMeetsBagel (6 million)
  15. Artsy (1 million)
  16. DataCamp (700,000)

In the list, ShareThis is in the top five attacked sites. So, it hit their companies badly.

ShareThis Data Breach

ShareThis discovered the breach late. How so?

The security incident occurred in July 2018. But, they posted the notice in February 2019. So, it took seven months before they learned about it.

Moreover, if there was no report, they will not find it out. Also, its data are already on the dark web posted for sale.

Information involved

According to the company’s report, it involved 2.7GB of stolen information. Also, the hackers posted it to the dark web market.

Unfortunately, it was posted for sale for less than $20,000 in Bitcoin currency.

So, what is the information involved? These are the affected data:

  • email addresses
  • full names
  • usernames
  • addresses
  • gender
  • hashed passwords
  • birthdates
  • other profile details

ShareThis’ action

Upon finding out, they posted a notice for their users. They also expressed their regrets about the incident.

Moreover, they already deactivated the affected accounts to the breach. They also reviewed and improved their systems.

These actions help them know why the breach happened. Also, they coordinated with data security experts. Forensic investigators were also hired.

So, these teams help ShareThis identify the necessary steps. Thus, they can improve their security.

Furthermore, they sent notification emails to the users affected by the breach. Hence, users can take precautions for it.

Protect your data

As we discussed, ShareThis already deactivated the affected users. These users include those who registered before January 2017.

But, even if you haven’t logged into ShareThis for a while, don’t be complacent. Why?

You may be using the same email or passwords to your other accounts. So, hackers can still use that to gain access.

What’s worse? If you used those details to your bank account, they could log in!

So, we advise you to change passwords. Besides, change it as soon as possible. Don’t wait for breaches to happen.

Here are some good password habits.

  1. Have a regular password change. Also, this is important whenever breaches happen.
  2. Do not reuse passwords. So, you should use different passwords for every website.
  3. Create strong and unique passwords. A strong password includes the capital and small letters. Also, special characters like symbols can add complexity. It should also have numbers.
Cybersecurity News

Looking Back At The Massive 2019 Armor Games Data Breach

Hackers compromised 100% of Armor Games’ user accounts. Let’s take a look at what happened on the Armor Games data breach.

Armor Games developed these popular games:

  • Kingdom Rush
  • Gemcraft
  • Dawn of the Dragons

The company confirmed that hackers compromised 100% of the company’s user data. This occurred in February 2019. Moreover, hackers leaked more than 620 million online accounts from 16 different websites. Afterward, they sold it to the dark web.

Dark Web

The Register revealed that hackers put the leaked accounts for sale on the dark web. The name of the marketplace is Dream Market cyber-souk. It can be accessed using the browser Tor. Furthermore, The Register found around 1.85 GB worth of Armor Games for sale at the Dream Market. It costs 0.2749 BTC. That is equivalent to $988.

Moreover, The Register noted that some of these online accounts contained social media authentication tokens. Furthermore, some of the accounts contain the location of the users. Fortunately, the leaked information from the Armor Games data breach did not contain payment card information or other financial details. 

Other Effects of The Armor Games Data Breach

The compromised users’ data include sensitive info such as:

  • Public profiles
  • Usernames
  • Login credentials
  • Dates of birth
  • Hashed passwords

Below states the list of compromised databases and how many accounts the hackers compromised:

  • 162 million accounts from Dubsmash
  • 151 million accounts from MyFitnessPal
  • 41 million accounts from ShareThis
  • 92 million from Heritage
  • 28 million accounts from HauteLook
  • 25 million from Animoto
  • 18 million from WhitePages
  • 16 million accounts from FotoLog
  • 11 million from Armor Games
  • 8 million from BookMate

Armor Games’ Statement

The company wrote recently to all its customers. They admitted the breach and how big it was. Moreover, they disclosed that the data of ALL customers were compromised.

The gaming brand said that the breach appears to be a part of a larger attack against 16 companies. Furthermore, Armor Games stated that they are one of the affected smaller companies. They claimed that apparently, they are holding two percent of the total accounts affected between the 16 companies.

Furthermore, the gaming brand also confirmed that the leak compromised public profiles. Thankfully, the financial details of the users were not leaked. That is only because the gaming brand doesn’t collect them. 

The company asked its users to change their passwords immediately. Furthermore, the company informed its users that the company makes changes on their side to harden the security. 

Furthermore, the gaming brand stated that they do their best to fix any weaknesses found in their audit. That included updating password protection and methods.

“Armor Games sincerely apologies for the inconvenience and concern this incident may cause, and remains committed to safeguarding the personal information in its care,” it added. Furthermore, the company claimed that none of the leaked data on the dark web was misused.

This is not the only incident of a huge data breach in 2019. In late July, Capital One announced that hackers compromised more than 100 million records. In October, Zynga announced that a hacker compromised the data of about 218 million customers.

Evite Data Breach: Over 100 Million Accounts Affected

The social planning website admitted to the Evite data breach. Worse, it affected more than 100 million accounts.

What happened? Also, how can you protect your information?


Evite is one of the biggest websites. But, it failed to protect the information of its users.

The hacker named Gnosticplayers claims to put up ten million accounts for sale. It also includes private information, such as:

  • full names
  • email addresses
  • IP addresses
  • passwords
  • birthdates
  • mailing addresses

However, Evite said that no Social Security numbers were involved. They also stated that they do not collect this information from their users.

Also, Evite does not store financial or payment data. They said that third-party vendors store these data on their internal systems.

Evite Data Breach

On April 15, 2019, a cybersecurity firm contacted Evite about the incident. Then, Evite confirmed it over the weekend.

Also, they published more details about the breach. The breach started on February 22.

Moreover, they finished the investigation after three months. In May 2019, they found an unauthorized party that accessed their files.

Evite’s action

First, Evite notified its users about it. They also posted a FAQ page on their website.

Granted, Evite reached out to external forensic experts. They also coordinated with the law officers.

Additionally, they contacted security experts. So, they can address weaknesses in their systems.

They also monitor their networks for access from their-party. Evite also added new security methods.

But, Evite said that perfect security is impossible. Still, they work with other security firms. So, they can remediate the breach.

Protect your data

Are you one of the Evite users? If so, how can you protect your data?

Evite suggested the following:

  1. Change your passwords if you reused it.
  2. Review your account. See if there are suspicious activities.
  3. Be careful of fake emails from Evite hackers.
  4. Never give your personal data to others.
  5. Avoid clicking on links from malicious websites.
  6. Be cautious in downloading files from suspicious emails.

How can you change your passwords in Evite? There are two methods.

  1. Login to your account. Then, go to Account Settings. You can change your password from there.
  2. If you forgot your password, click Reset Password. Then, follow the steps to change your passwords.

You can also check the Account Inquiries on Evite Help Page.

Here are some ways to protect.

  1. Change your passwords. Make sure that your passwords are strong and unique. It uses upper and lowercase letters. Also, it has special characters and numbers. Experts also said that it should not contain your address, birthday, or family names.
  2. Never reuse passwords. It is easier said than done. But, we should not use exposed passwords at all. Cybercriminals can still find your passwords on the dark web. So, they can use it to log in to your other accounts. Thus, the best way to protect is to never reuse it.
  3. Use a password manager. Remembering a password for each site can be hard. So, using a password manager can help. It will automatically store your passwords. Thus, you can secure your logins every time.
Cybersecurity News

Taking A Deeper Look at The Deloitte Data Breach

The Deloitte data breach is one ironic data breach. Why? Because the company was recognized in 2012 as the best cybersecurity consultant in the world. However, even this company didn’t escape from hackers. Let’s find out in this article the reason behind it.

Deloitte Touche Tohmatsu Ltd.

That is the full name of the company. Deloitte belongs to one of the world’s “big four” accounting firms. However, even the company that huge ran short of protecting itself from a data breach. Hackers used complex methods to compromise the confidential email and plans of some of its blue-chip clients.

Deloitte registered in London and now has its global headquarters in New York, U.S.A. It took at least four months before the company noticed the breach. Furthermore, what made this breach more embarrassing is the company reported $37B revenue in 2016. Moreover, the company provides consultancy in taxes, auditing – and ironically speaking, in cybersecurity.

No Two-Step Verification Spelled The Deloitte Data Breach

Deloitte discovered the breach in March 2017. But, The Guardian believes that hackers accessed the company’s systems since October/November 2016. The hackers hacked an administrator’s account. Afterward, this gave hackers privileged and unrestricted areas in all areas.

The Guardian reported that the administrator’s account the hackers broke into didn’t have two-step verification. In sum, it only required a single password.

Two-step verification involves both entering your password and entering a code sent to your phone. First, you sign in with your email and password. Afterward, the system sends a passcode to your phone. 

Thus, hackers need both your passwords and a way to read your texts to access your account. This is an effective method of securing your account. Yet, Deloitte didn’t have this feature enabled on the administrator’s account.

The Effects Brought By Deloitte Data Breach

Azure stored 240,000 emails involving Deloitte’s staff. Microsoft provides the cloud service Azure. It is equivalent to Amazon Web Service and Google’s Cloud platform.

Moreover, the hackers potentially accessed login details besides emails. Furthermore, hackers accessed IP addresses and architectural diagrams for businesses. Also, the hackers possibly gained access to health information. Additionally, some emails had attachments with sensitive security and design details.

Deloitte Data Breach Secluded 

The breach is believed to have been US-focused and was regarded as so sensitive that only a handful of Deloitte’s most senior partners and lawyers were informed.


Specialists analyze the electronic trail of made searches. This may result in specialists figuring out where the hackers went. 

According to The Guardian, the investigation team works out of the firm’s offices in Rosslyn, Virginia. Analysts review the compromised documents for six months. Moreover, they have not concluded yet about the incident. That is whether a single hacker, business rival, or state-sponsored hackers was responsible for the incident.

This is not only the incident where a huge company experienced a data breach. For instance, Equifax admitted in September 2017 that hackers compromised the personal data of 143 million US customers back in May.