DNC Server Hack – What is Cybersecurity Doing About it?

First, the Panama Papers, then the Clinton email controversy, and now the Democratic National Committee’s (DNC) server hacking scandal. The lack of cybersecurity and protection in these events leaves international and government cybersecurity firms wondering when will the breach be enough to start discussing increased cybersecurity? The worst part: computer incident response and forensic cybersecurity analysts allege that the source of the DNC server hack stems from Russia.

If you are tired of all the updates, scandals, and cybersecurity faux pas you are likely not alone. The real question is what are corporations, organizations, financial institutions, and the government doing about it? How many more leaks, attacks and hacks have to be perpetrated in order for cybersecurity to be discussed on a more intimate level?

After initial computer incident response services were conducted by United States-based government cyber security firms, it was confirmed that the hackers had access for a year and it was only until recently that anyone realized that the DNC server hack had even taken place.

News outlets are saying that reports found that nothing of value was even taken after the DNC’s servers hack, which should be a relief. However, the issue still remains that the system was not secure. What no one seems to be talking about is the cybersecurity aspect. After something as big as the DNC server hack, government cybersecurity agencies would expect cybersecurity to be at the forefront of discussion, but it hasn’t.

This raises additional suspicions. If we were to speculate, why would someone go through the trouble of a DNC server hack if they did not want to steal anything? Likely, something was stolen but the information is not being released.

According to Akash Desai, cybersecurity expert at ERMProtect: “In the cybersecurity world, stealing the Queen’s crown is not required – even a copy of the Queen’s crown can be stolen and the impact is the same.”

Additionally, what’s to say that Trojans and malware was not left behind to further compromise the server, even at this point long after the attack.

Computer incident response and forensic cybersecurity is an integral part of ERMProtect's services, including incident response retainers. These are fantastic services to acquire, but prevention is better than a cure, and an incident response analysis will help prevent future leaks and stop current ones. Nothing can compare to actual cybersecurity, penetration testing, and threat management in order to prevent cyberattacks and information breaches.

Stop Phishing Attacks with ERMProtect's Security Awareness Training

Turn your employees into a human firewall with our innovative Security Awareness Training.

Our e-learning modules take the boring out of security training.

ERMProtect's Weekly Newsletter

Get a curated briefing of the week's biggest cyber news every Friday.

Intelligence and Insights

Biggest Cybersecurity Trends

The Biggest Cybersecurity Trends to Watch in 2023

As we begin a new year, here’s a look at some of the top security trends that are emerging now and could pick up pace in 2023 …
Cybersecurity Threats of 2022

The Biggest Cybersecurity Threats of 2022

Here’s a look at the biggest cybersecurity threats from 2022, and what organizations should pay close attention to in the coming year …
soc 2 auditor

Top 10 Tips for Choosing a SOC 2 Auditor

Choosing a SOC 2 auditor can seem like a complicated process, but keep in mind that the most important factor is picking someone who will be a valuable partner …