T-Mobile Breach Highlights Common Corporate Security Weakness
Many companies don’t properly secure APIs, the ubiquitous interface that lets technology programs communicate
Health-ISAC mention:
“API security is an area that’s largely been overlooked,” said Errol Weiss, chief security officer of the Health Information Sharing and Analysis Center, a nonprofit group that enables healthcare organizations to share information about cyber threats. “The main challenge is getting cybersecurity teams to realize how vulnerable their APIs are,” he said.
Jan. 23, 2023 5:30 am ET | WSJ PRO
The data breach of about 37 million T-Mobile US Inc. customers occurred through an attack on an API, or application programming interface, highlighting a risk facing many businesses.
APIs connect applications and share information in many settings, like mobile applications that connect to a social media platform, cars that drivers can unlock via an app, or backroom technology that moves data across different information systems.
Companies rely on APIs as they expand technology projects, often without proper security measures, cybersecurity analysts and researchers say.
Read the full article in the Wall Street Journal:
- Related Resources & News
- Leveraging ISO 81001-5-1 Amid Medical Device Procurement
- Mitigating risk as healthcare supply chain attacks prevail
- Enhancing Cybersecurity in Rural Hospitals
- Health-ISAC Hacking Healthcare 11-15-2024
- Cyber Incident Response: Playbook for Medical Product Makers
- Feds Warn of Godzilla Webshell Threats to Health Sector
- Trump’s Return: Impact on Health Sector Cyber, HIPAA Regs
- Health-ISAC Hacking Healthcare 11-7-2024
- Protecting the Healthcare Supply Chain Against Russian Ransomware Attacks
- All hospitals should be concerned about cyberattacks. Here’s why