CEO Reacted On Altered Documents From European Medicines Agency Breach

By   ISBuzz Team
Writer , Information Security Buzz | Jan 19, 2021 05:38 am PST

Following the news that criminals released altered medical documents obtained from the European Medicines Agency breach to undermine trust in the Pfizer vaccine please find a comment below from the CEO on this breach. 

Subscribe
Notify of
guest
1 Expert Comment
Newest
Oldest Most Voted
Inline Feedbacks
View all comments
Russell Haworth
January 19, 2021 1:49 pm

<p style=\"font-weight: 400;\">The attack on the <a href=\"https://www.infosecurity-magazine.com/news/hackers-raid-european-agency/\" data-saferedirecturl=\"https://www.google.com/url?q=https://www.infosecurity-magazine.com/news/hackers-raid-european-agency/&source=gmail&ust=1611149132307000&usg=AFQjCNGVfLqDpEk4zL1yCGsD1J6-kDiJkQ\">European Medicines Agency in December</a> and <a href=\"https://www.infosecurity-magazine.com/news/leaked-covid19-vaccine-data/\" data-saferedirecturl=\"https://www.google.com/url?q=https://www.infosecurity-magazine.com/news/leaked-covid19-vaccine-data/&source=gmail&ust=1611149132307000&usg=AFQjCNHko-5nsU62GRL_0eSLiHLHRVA7xQ\">subsequent leaking of altered documents revealed late last week</a> has highlighted the potential of disinformation campaigns to be life-threatening. We saw similar tactics used in the run-up to the US presidential election, which threatened to erode public trust. Now, with global health on the line, governments around the world cannot afford to have their citizens lose trust in their ability to protect them. This has real-world implications, potentially leading to people not getting vaccinated and leaving themselves and loved ones vulnerable to a dangerous virus. </p> <p> </p> <p style=\"font-weight: 400;\">It is very important that public institutions have a good breadth and depth of security to defend against these types of attacks. From identifying where education needs to take place, systems that can build a broad foundation of security into the public sector infrastructure, through to technology that works deep in the network and can identify anomalous behaviour. Ultimately, by coordinating threat intelligence and response between governments and industry, resilience to disinformation campaigns and the subversive methods used by cybercriminals can be built.</p>

Last edited 3 years ago by Russell Haworth

Recent Posts

1
0
Would love your thoughts, please comment.x
()
x