{"id":4909,"date":"2017-11-07T11:49:44","date_gmt":"2017-11-07T16:49:44","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis5211sec001fall17\/?p=4909"},"modified":"2017-11-07T11:49:44","modified_gmt":"2017-11-07T16:49:44","slug":"accenture-latest-firm-caught-with-lax-cybersecurity","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/mis5211sec001fall17\/2017\/11\/07\/accenture-latest-firm-caught-with-lax-cybersecurity\/","title":{"rendered":"Accenture latest firm caught with lax cybersecurity"},"content":{"rendered":"<p><a href=\"https:\/\/www.consultancy.uk\/news\/14433\/accenture-latest-firm-caught-with-lax-cybersecurity\">https:\/\/www.consultancy.uk\/news\/14433\/accenture-latest-firm-caught-with-lax-cybersecurity<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>On the heels Deloitte\u2019s security vulnerability coming to light another company large in the cyber security space reportedly suffers from lax cyber security themselves. The article explains that Accenture had a large cache of sensitive information on their cloud stage without it being password protection. It is believed that the information is now secure without incident but I think it is probably too soon to be sure that it wasn\u2019t accessed by someone with malicious intent. Like with Deloitte, it draws into question Accenture\u2019s credibility in that they recommend to their clients best cyber security practices but fail to follow them themselves.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>https:\/\/www.consultancy.uk\/news\/14433\/accenture-latest-firm-caught-with-lax-cybersecurity &nbsp; On the heels Deloitte\u2019s security vulnerability coming to light another company large in the cyber security space reportedly suffers from lax cyber security themselves. The article explains that Accenture had a large cache of sensitive information on their cloud stage without it being password protection. It is believed that the information is now [&hellip;]<\/p>\n","protected":false},"author":4919,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[716794],"tags":[],"class_list":{"0":"post-4909","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-week-10-monitoring-evaluating-it","7":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall17\/wp-json\/wp\/v2\/posts\/4909","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall17\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall17\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall17\/wp-json\/wp\/v2\/users\/4919"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall17\/wp-json\/wp\/v2\/comments?post=4909"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall17\/wp-json\/wp\/v2\/posts\/4909\/revisions"}],"predecessor-version":[{"id":4911,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall17\/wp-json\/wp\/v2\/posts\/4909\/revisions\/4911"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall17\/wp-json\/wp\/v2\/media?parent=4909"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall17\/wp-json\/wp\/v2\/categories?post=4909"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall17\/wp-json\/wp\/v2\/tags?post=4909"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}