4 Times a Security Breach Was Narrowly Avoided


We’ve all heard of prominent companies who have been a victim of a data breach. Little to no attention, however, is given to organizations that narrowly avoided security-shaking catastrophe through good judgement, quick thinking or just plain luck. 

This article covers four instances where a security breach was narrowly avoided and what helped prevent the disaster from happening. Read on, and you can learn from their (almost-) mistakes and quick thinking! 

1. City of Las Vegas

Officials from the city of Las Vegas revealed that their systems were targeted with a sophisticated cyberattack during the 2020 Consumer Electronics Show (CES). This forced the local government to shut down many of its online services. Fortunately, an employee working in the city’s IT department was able to identify the threat in the early hours of January 8th, 2020 and prevent the systems from being breached.

According to Las Vegas Review-Journal, city spokesman David Riggleman said that officials have been proactive in protecting its IT network. On average, the city experiences 279,000 data breach attacks on a monthly basis. However, swift action by its IT staff helped the city avoid what had the potential to cause severe damage. The data systems were also shortly restored to normal function.

2. Ukraine election 

In 2014, Ukraine’s Central Election Commission narrowly escaped a breach when hackers from the pro-Russian CyberBerkut group infected its computers and attacked files critical to vote-counting. Twenty-hour hours later, government officials announced that the system had been restored from backups and everything can go on as scheduled. However, shortly before the election results were destined to air on television, cyber experts working for the government detected and removed a virus secretly placed on the Election Commission’s PCs.

Had the Ukrainian government experts failed to remove (Read more...)

*** This is a Security Bloggers Network syndicated blog from Infosec Resources authored by Dan Virgillito. Read the original post at: