Cognizant Ransomware Attack

Personal Information Exposed

IT provider Cognizant informed its employees about a Maze ransomware attack on May 1st. Personal information, including names and company credit card numbers, were part of the compromised data. However, some employees were also exposed to additional data exposure.

“The small number of associates who have had other kinds of personal information exposed will be notified directly by June 24, 2020, and will also receive complimentary identity theft protection,” the company reportedly said.

Cognizant provides a multitude of IT services, including technology, operation services, digital, and consulting. They’re based out of New Jersey. Cognizant is a publicly traded Fortune-500 company.

News of a ransomware attack on an IT corporation is unsettling. IT leaders are the ones leading the way in the fight against ransomware. Likewise, we look to companies like Cognizant to deploy the most sophisticated defenses against ransomware.

Cognizant is providing monitoring and restoration services to all employees, whether affected or not. They are also working with the FBI on investigation of the attack. This, however, won’t stop them from losing an estimated $50-$70 million in revenue this quarter.

Attacks like this only solidify the need for proactive and up-to-date security plans. As the criminals become more sophisticated, it’s our responsibility to counterbalance with our own sophisticated measures.

If you haven’t done so in awhile, change your passwords. Also consider employing two-factor authentication. Keeping data safe is all our responsibility.

Stay safe out there.

847 total views, 5 views today

(Visited 1 times, 1 visits today)
Related Reading  Hackers, Branded As Terrorists, Release Trump Emails

One thought on “Cognizant Ransomware Attack

  1. Cut circuits to certain areas that are affected most . Monitor how many, time and velocity of intrusion. Collect your data. Reopen that circuit and close another; monitoring that newly opened and closed circuits activity as before.
    Amounts of intrusions and failed intrusions and area should help you to determine your goal.
    Myself, I always believe; an “eye for an eye”. Develop Offensive Electronic Countermeasures to include Complete Destruction of Attacker have a Spy remain in a system to send you their ongoing data. But probably first and foremost, develop an EMP to destroy the area, meaning talking systems. Evaluate.

    ANSWER: DEVELOP A FIRST AND SECOND WAVE OF INTRUSIONS AT TARGET WITH AN EMP. Cut circuit. 10 HOURS LATER CONNECT TO AREA. Monitor and evaluate received data

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.