Andy Jenkinson’s Post

View profile for Andy Jenkinson

Group CEO CIP. Fellow Cyber Theory Institute. Director Fintech & Cyber Security Alliance (FITCA) working with Governments. NAMED A GLOBAL EXPERT IN INTERNET ASSET & DNS VULNERABILITIES

Sixt is a German-based vehicle rental, car sharing, and ride-hailing service provider operating about two thousand locations in over 105 countries. SIXT suffered a cyberattack on April 29. Is this attack another case of a company buying all the Bells & Whistles, whilst ignoring basic security practices? We think the below may certainly evidence that possibility. Sadly, this Not Secure SIXT website is not an isolated situation, nor is the fact their DNS is also exposed and insecure. In an interview this morning with a Gaming magazine re the spate of Gaming companies suffering cyberattacks, I was posed the question; ''why are the gaming companies targeted?'' My answer was simple; A large collection and nucleus of people's data and the fact the data is being maintained insecurely... Gaming companies, Car Hire Companies like SIXT are NOT specifically targeted, the attacks are NOT sophisticated. They are simply exposed, identified, and then exploited... SIXT are no doubt another in an ever growing list of organisations that suffer cyberattacks costing $millions, call in The Experts, and remain Insecure months and years later. As a car rental operator, they check their fleet daily, check them in, and out every time they are hired, they need to adopt the same controls on their internet security, websites, servers and DNS positions. Would they hire a car out and never check it, year after year? Of course not, so why run that risk, the risk that will cost $millions on their digital security? #WhitethornShield #Internetsecurity #dns #pke #sixt

  • No alternative text description for this image
Jon Gagan Shende

Data Science| Identity and Access Management|Product| GCP, Azure,AWS Infrastructure Security|AI & Machine Learning |Digital Transformation|Ernst & Young|Accenture

1y

Business as usual Andy Jenkinson, vendors need to make quarterly revenue targets, sales people their quota & delivery engineers have to fix an impossible comment or promise a sales person made to a CXO buying a product. Two weeks ago I had a conversation about an ITSec leadership role for a company getting into Fintech & wanting to do an IPO Had a conversations with a developer, who claims security, so tried to talk about SOX404 and Identity, potential material weakness, by walking through configuring a JBoss server for MFA;think locking down web services by authenticating users, with a bearer token sent with an incoming HTTPS request, or think about a flip to AD and setting up Azure Multi-Factor Authentication Server factoring in load and high availability requirements I could not believe the amount of interjections and interruptions, so this person could hear how smart he sounds to himself. This person is the entry point for a hacker This is a bane in ITSec, it is so high profile that everyone jumped in, from folks w/music& law degrees, to former chefs.,yet those who can actually do the job, get shot down or sit in silent frustration as recommendations are ignored, only to see an external consultant say the same at $400/hr

David Eric J.

Zafeiri Corporation, CEO | Operational/Financial Forecasting | Turnaround | Fractional C-Suite | Strategic Services | Leadership Development | Key Note Speaker | ProVisors | BoD GCTI Foundation Operations Chair

1y

Completely correct. The attack is simply phase 1. The benefit is the extensive data they retrieve.

See more comments

To view or add a comment, sign in

Explore topics