Security researchers have found a security lapse at Stewart International Airport that exposed server backups to the Internet for more than a year. The backups contained sensitive information including one file with a list of usernames and passwords for various devices and systems, allowing full access to the airport’s internal network. The drive was installed by a third-party IT contractor. Michael Patterson, CEO at Plixer commented below.
“After uncovering an exposed backup system, it is often a good idea to review historical traffic patterns headed to the Internet from the server at risk. This allows security teams to determine if any massive downloads took place. Organizations leveraging 3rd party assistance in IT need to make sure that they hold their contractors accountable and that they adhere to internal security practices. Requiring that they have insurance to help cover the loss from security breaches, should be a serious consideration.”
Security Lapse That Exposed Critical Servers At A NYC Airport
Security researchers have found a security lapse at Stewart International Airport that exposed server backups to the Internet for more than a year. The backups contained sensitive information including one file with a list of usernames and passwords for various devices and systems, allowing full access to the airport’s internal network. The drive was installed by a third-party IT contractor. Michael Patterson, CEO at Plixer commented below.
Michael Patterson, CEO at Plixer:
Recent Posts
Experts Views On Ransomware-as-a-service (RaaS) Like “Black Basta”
Expert insights – USB Stick Containing An Entire City’s Personal Details Has Been Lost
Phone Hackers: 9 Ways To Tell If You Have Fallen Victim
How Can We Protect Against NotPetya Like Malware?
Russian Hackers Claim Responsibility For Cyberattack On Lithuania, Expert Reaction