HACKED

A few facts and figures

  • Florida 2016: theft of personal info of around 80 officers from a government database. Hackers tweeted that they got it “directly off of the feds servers”
  • Fraternal Order of Police, USA 2016: 2.5 GB of stolen personal and sensitive data was published. A pseudo-encryption key may have been used to access the data
  • Canada 2016: USB stolen from an officer’s car. Data may have been about police operations
  • Big Brother Watch, UK 2011 – 2016: approx 2,315 breaches by around 800 employees accessing and sharing sensitive data with external sources
  • Netherlands 2016: laptops with confidential data were stolen from a detective’s car. Rules for saving sensitive data may not have been followed
  • Spain 2016: hackers posted personal details and passwords of 5000 policemen in protest to the GAG law

WHAT YOU NEED TO KNOW

THREATS
Unauthorized access to protected and unprotected data
Innocent provision of data, extortion or forced handover of sensitive info
Data leaking via endpoints
Viruses, Trojan horses or worms via endpoints
Trafficking and external use of stolen sensitive data
RISKS
People: personal data, contact info, data about family, finances, assessments and certification
Precinct: internal and external information, nearly all digital data like population registries, government, banking, medical, educational, national and international law enforcement databases

This may happen

Malicious control of sensitive police information, data networks and information
Trafficking and reusing stolen / modified information
Shutting down law enforcement networks and web-portals
Actual danger to people’s safety
Irreparable damage to police integrity and image
Irreparable loss of police / potential police / staff and confidence and retention resulting in financial loss
Countless waste of time and money spent handling successful attacks
Irreparable damage to the police supply chain
Failing to comply with regulations and standards like like like EU GDPR, or HIPAA
TO PROTECT YOUR DATA
CONTACT US

Data Protection Suite Modules

product
INSPECTOR
Inspector checks both file content and metadata without preventing the natural flow of business.
READ MORE
product
REPORTER
Reporter automatically pulls strategic and periodic information into reports and distributes them to defined recipients.
READ MORE
product
ENCRYPTOR
Encryptor, a smooth-running and transparent data encryption tool, fully protects your company’s private information.
READ MORE
product
DISCOVERER
Discoverer provides the knowledge and insight for security personnel to introduce current and strong data security policies to protect sensitive company information.
READ MORE
product
PROTECTOR
Protector has the flexibility and strength to control your port and device endpoints and to shield your company against external hazards.
READ MORE
product
AUDITOR
Auditor pinpoints all usage of USB, FireWire, PCMCIA, PCI, internal storage and WiFi connections in exportable reports.
READ MORE
Font Resize