CIODigital DisruptionIncident ManagementIT Governance

13 Scary IT Incidents Told by IT Leaders. Can You Relate to Any?

Cyber attacks, digital initiative failures, or scarcity of new talents—IT leaders have experienced it all. They are hoping from one scary incident to the other with momentary market disruptions. In this article at the Enterprisers Project, Nano Serwich shares 13 scary IT incidents narrated by IT leaders.

What Scares the IT Leaders?

The answer is—almost everything. CIOs mostly tread on unchartered waters. They risk their career along with their company’s reputation in every initiative. Serwich shares the experience that 13 IT leaders had gone through during that journey:

  1. Unidentified Intellectual Assets: ZL Technologies Director Farid Vij narrates how a Fortune 500 company is paying $2M annually for classified business records. 5 million boxes of physical assets are present with vendors and company storages throughout the U.S.
  2. Inaccessible Backups: Ace Work Gear’s Max Robinson says that his company used to back up every data. One day, they realized that they had no access to the backed-up data.
  3. Email Impersonation: Key Information Systems CIO Scott Youngs says that emails impersonating the company CFO would demand sensitive information from employees.
  4. Ghost in the IoT App: Arxan Technologies CMO Mandeep Khera says that IT companies are still working on the security of their IoT devices. The hackers are utilizing this vulnerability to launch major attacks.
  5. Corrupt Data: Rapid7 CIO Rajeev Jaswal narrates how their backup data went corrupt and nobody realized it earlier. They were able to retrieve the data after losing hours of sleep.
  6. Ransomware: Curricula CEO Nick Santora narrates how one of the nation’s power grid was attacked with ransomware and had to cough up $10,000 in Bitcoin.
  7. No Phones for Sales: Rapid7 Director Derek Heintz narrates how the sales department had no phones for two days. He had to create an impromptu backup to get the sales operations up and running.
  8. Ransomware II: GreenPal Co-founder Gene Caballero narrates how a Californian hospital had to pay $2 million because their systems were not secure.
  9. Cloud Attack: SAP Ariba CISO Lakshmi Hanspal warns that the cloud is not secure. You must design systems that would reset without data loss, discouraging attackers to cash in on your vulnerability.
  10. Employee’s Revenge: Portnox CEO Ofer Amitai shares how an employee accessed the company server and spread ransomware after being let go.
  11. Fear of the New: Schneider Electric Director Cassie Crossley says that every new setup carries a risk. However, this should not deter you from trying out new technologies.
  12. Data Breach Normalization: ThreatSTOP VP Joe Dahlquist is horrified that people are normalizing attacks by accepting those as a regular challenge. However, this should not be the case.
  13. Lessening Importance of Application Security: Checkmarx Global Director Matt Rose says that developers feel less anxious about application security nowadays. When a new feature is added, employees sabotage the security to enjoy the new features.

To view the original article, visit the following link:

Indrani Roy

Indrani Roy is currently working as a Content Specialist for CAI Info India. She has knowledge in writing blogs, product descriptions, brand information, and coming up with new marketing concepts. Indrani has also transcribed, subtitled, edited, and proofread various Hollywood movies, TV series, documentaries, etc., and performed audio fidelity checks. She started her career by articulating a knowledge base for an IT client, and, eventually, went on to create user manuals and generate content for a software dashboard. Writing being one of her passions, reading books is naturally her favorite pastime. When not lost in the world of letters, she is a foodie, movie buff, and a theater critic.

Related Articles

Back to top button

We use cookies on our website

We use cookies to give you the best user experience. Please confirm, if you accept our tracking cookies. You can also decline the tracking, so you can continue to visit our website without any data sent to third party services.