top of page

W-2 Data Breach places 21K Sprouts Farmers Market employees at risk

This is yet another example of a well-crafted phishing attack that has resulting in the compromise of significant PII.  These issues are not combated by technical controls alone.  Organizations must dedicate resources to effective user awareness training and design policies and procedures that allow for proper checks and balances.  IT can not solve all problems.

1 view

Recent Posts

See All

Rethinking Software in the Organizational Hierarchy

I very much enjoyed this article from Pieter Danhieux via Dark Reading and this creative approach to the management of applications and hierarchical security. The concept of least privilege and the d


bottom of page