Many organizations are found purchasing, installing, and setting up services using out-of-the-box configurations and default settings. Research and briefly describe a current incident (within the past year) where an organization was exploited because of a lack in security best practices, updated patches, secure configurations, etc. What would you recommend organizations establish to ensure long-term protection of systems and applications?
Pick a major data breach case that occurred in 2016 or later and was well publicized in the news media and other journals or periodicals. Research the incident and get as many details as possible indicating who perpetrated the crime, what methods were used to get inside the network, what data was stolen, and the extent of the damage in dollars and to the organization. Also, indicate the extent of the damage to the organization’s reputation and any other intangible harms that resulted from the security breach.