View Single Post
Old 09-23-2014, 03:44 AM   #64
Froide
Wizard
Froide ought to be getting tired of karma fortunes by now.Froide ought to be getting tired of karma fortunes by now.Froide ought to be getting tired of karma fortunes by now.Froide ought to be getting tired of karma fortunes by now.Froide ought to be getting tired of karma fortunes by now.Froide ought to be getting tired of karma fortunes by now.Froide ought to be getting tired of karma fortunes by now.Froide ought to be getting tired of karma fortunes by now.Froide ought to be getting tired of karma fortunes by now.Froide ought to be getting tired of karma fortunes by now.Froide ought to be getting tired of karma fortunes by now.
 
Froide's Avatar
 
Posts: 1,898
Karma: 9851695
Join Date: Mar 2012
Location: Noo Yawk
Device: Samsung Galaxy and Windows devices. RIP: Palm & Nook devices.
Quote:
Originally Posted by khalleron View Post
Other than PR-wise, I don't think that's really an issue.
I beg to differ, and so do others.

For example, the following article addresses what companies should NOT do before, during, and after a breach: JULIE CRESWELL and NICOLE PERLROTH. (SEPT. 19, 2014). "Technology: Ex-Employees Say Home Depot Left Data Vulnerable." The New York Times.

And this post documents some consequences suffered by a number of companies (and multiple stakeholder groups) after said companies did not respond appropriately after their data was hacked: Karen Chu. (August 24, 2014). "Security: The Right (And Wrong) Way to Respond to a Data Breach." Bitium.

The implications - tangible and intangible - are greater than those you noted.

Last edited by Froide; 09-23-2014 at 04:23 AM.
Froide is offline   Reply With Quote