Home Security Sabre rattled and hacked

Sabre rattled and hacked

Travel industry software booking engine Sabre has disclosed what may be a massive breach of payment and customer data. Sabre is used by more than 36,000 hotels and accommodation providers.

Security expert Brian Krebs spotted this admission via a mandatory quarterly filing with the US Securities and Exchange Commission. It said Sabre was “investigating an incident of unauthorised access to payment information contained in a subset of hotel reservations processed through our Hospitality Solutions SynXis Central Reservations system.”

Sabre’s press statement said it had engaged security forensics firm Mandiant to support its investigation, and that it had notified law enforcement. “The unauthorised access has been shut off and there is no evidence of continued unauthorised activity.

There is no reason to believe that any other Sabre systems beyond SynXis Central Reservations have been affected” Sabre’s statement read.

SC Magazine US strongly suggests that compromised credentials may have contributed to this data breach.

Centrify Corey Williams

Corey Williams (left), senior director Products and Marketing at cyber security and identity access management specialist Centrify, said, “This latest data breach again demonstrated the vulnerability of password-based protection. Once more, we’re reminded of the danger of relying on passwords as the means of securing access to corporate systems, apps or data.

“Passwords are the number one security problem in the world. The only reliable defence against attackers is to enable two-factor authentication. Two-factor authentication involves combining an additional factor – such as a code sent to your phone via text, voice call or mobile app – alongside a password. This raises the bar for security, making it much harder for attackers to compromise work systems and data.”

Centrify says two-factor authentication will thwart the clear majority of hacks that target corporate employees, including those with excessive permissions. Organisations should be mandating the use of two-factor authentication whenever it is technically possible. 

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips

DOWNLOAD NOW!

RECOVERING FROM RANSOMWARE

Ransomware is a type of malware that blocks access to your files and systems until you pay a ransom.

The first example of ransomware happened on September 5, 2013, when Cryptolocker was unleashed.

It quickly affected many systems with hackers requiring users to pay money for the decryption keys.

Find out how one company used backup and cloud storage software to protect their company’s PCs and recovered all of their systems after a ransomware strike.

DOWNLOAD THE REPORT!

Ray Shaw

joomla stats

Ray Shaw ray@im.com.au  has a passion for IT ever since building his first computer in 1980. He is a qualified journalist, hosted a consumer IT based radio program on ABC radio for 10 years, has developed world leading software for the events industry and is smart enough to no longer own a retail computer store!

 

Popular News

 

Telecommunications